JupyterHub <= 5.4.3
An open redirect vulnerability in JupyterHub <=5.4.3 allows attackers to construct links which, when clicked, take users to the JupyterHub login page, after which they are sent to an arbitrary attacker-controlled site outside JupyterHub instead of a JupyterHub page, bypassing JupyterHub's check to prevent this.
Upgrade to JupyterHub 5.4.4
A deployment can apply filters on the Location header in a reverse proxy such as nginx/apache/traefik.
{
"github_reviewed": true,
"github_reviewed_at": "2026-04-03T21:36:07Z",
"severity": "MODERATE",
"nvd_published_at": null,
"cwe_ids": [
"CWE-601"
]
}