DEBIAN-CVE-2026-23528

Source
https://security-tracker.debian.org/tracker/CVE-2026-23528
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23528.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-23528
Upstream
Published
2026-01-16T17:15:54.640Z
Modified
2026-01-17T11:11:29.177498Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Dask distributed is a distributed task scheduler for Dask. Prior to 2026.1.0, when Jupyter Lab, jupyter-server-proxy, and Dask distributed are all run together, it is possible to craft a URL which will result in code being executed by Jupyter due to a cross-side-scripting (XSS) bug in the Dask dashboard. It is possible for attackers to craft a phishing URL that assumes Jupyter Lab and Dask may be running on localhost and using default ports. If a user clicks on the malicious link it will open an error page in the Dask Dashboard via the Jupyter Lab proxy which will cause code to be executed by the default Jupyter Python kernel. This vulnerability is fixed in 2026.1.0.

References

Affected packages

Debian:11 / dask.distributed

Package

Name
dask.distributed
Purl
pkg:deb/debian/dask.distributed?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2021.*

2021.01.0+ds.1-2.1
2021.01.0+ds.1-2.1+deb11u1
2021.08.1+ds.1-1
2021.09.1+ds.1-1
2021.09.1+ds.1-2
2021.09.1+ds.1-3

2022.*

2022.01.0+ds.1-1
2022.02.0+ds.1-1
2022.02.0+ds.1-2
2022.02.0+ds.1-3
2022.12.1+ds.1-1
2022.12.1+ds.1-2
2022.12.1+ds.1-3

2023.*

2023.8.0+ds.1-1
2023.12.1+ds-1
2023.12.1+ds-2
2023.12.1+ds-3
2023.12.1+ds-4

2024.*

2024.5.2+ds.1-1
2024.5.2+ds.1-2
2024.5.2+ds.1-3
2024.5.2+ds.1-4
2024.5.2+ds.1-5
2024.5.2+ds.1-6
2024.5.2+ds.1-7
2024.5.2+ds.1-8
2024.12.1+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23528.json"

Debian:12 / dask.distributed

Package

Name
dask.distributed
Purl
pkg:deb/debian/dask.distributed?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2022.*

2022.12.1+ds.1-3

2023.*

2023.8.0+ds.1-1
2023.12.1+ds-1
2023.12.1+ds-2
2023.12.1+ds-3
2023.12.1+ds-4

2024.*

2024.5.2+ds.1-1
2024.5.2+ds.1-2
2024.5.2+ds.1-3
2024.5.2+ds.1-4
2024.5.2+ds.1-5
2024.5.2+ds.1-6
2024.5.2+ds.1-7
2024.5.2+ds.1-8
2024.12.1+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23528.json"

Debian:13 / dask.distributed

Package

Name
dask.distributed
Purl
pkg:deb/debian/dask.distributed?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2024.*

2024.12.1+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23528.json"

Debian:14 / dask.distributed

Package

Name
dask.distributed
Purl
pkg:deb/debian/dask.distributed?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2024.*

2024.12.1+ds-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23528.json"