CVE-2026-39378

MEDIUM

nbconvert has an Arbitrary File Read via Path Traversal in HTMLExporter Image Embedding

Title source: cna

Description

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. In versions 6.5 through 7.17.0, when `HTMLExporter.embed_images=True`, nbconvert's markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML. nbconvert 7.17.1 contains a fix. As a workaround, do not enable `HTMLExporter.embed_images`; it is not enabled by default.

Scores

CVSS v3 6.5
EPSS 0.0004
EPSS Percentile 10.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Details

CWE
CWE-22 CWE-73
Status published
Products (2)
jupyter/nbconvert >= 6.5, < 7.17.1
pypi/nbconvert 6.5.0 - 7.17.1PyPI
Published Apr 21, 2026
Tracked Since Apr 21, 2026