A stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook allows attackers to steal authentication tokens from users who open malicious notebook files and interact with elements that the attacker can make look indistinguishable from legitimate controls (single click interaction).
The vulnerability enables complete account takeover through the Jupyter REST API, allowing the attacker to: 1. Read all files 2. Modify/create files 3. Access running kernels and execute arbitrary code 4. Create terminals for shell access
Jupyter Notebook 7.5.6 and JupyterLab 4.5.7 include patches for this vulnerability.
The help extension can be disabled via CLI:
jupyter labextension disable @jupyter-notebook/help-extension
jupyter labextension disable @jupyterlab/help-extension
The patched versions include a toggle to disable the command linker functionality altogether, for example via overrides.json:
{
"@jupyterlab/apputils-extension:sanitizer": {
"allowCommandLinker": false
}
}
Reported by Daniel Teixeira - NVIDIA AI Red Team
{
"cwe_ids": [
"CWE-601",
"CWE-79"
],
"github_reviewed_at": "2026-04-30T17:25:47Z",
"github_reviewed": true,
"severity": "HIGH",
"nvd_published_at": "2026-05-06T20:16:31Z"
}