CVE-2026-39378
MEDIUMnbconvert has an Arbitrary File Read via Path Traversal in HTMLExporter Image Embedding
Title source: cnaDescription
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. In versions 6.5 through 7.17.0, when `HTMLExporter.embed_images=True`, nbconvert's markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML. nbconvert 7.17.1 contains a fix. As a workaround, do not enable `HTMLExporter.embed_images`; it is not enabled by default.
Scores
CVSS v3
6.5
EPSS
0.0004
EPSS Percentile
10.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
CWE-73
Status
published
Products (2)
jupyter/nbconvert
>= 6.5, < 7.17.1
pypi/nbconvert
6.5.0 - 7.17.1PyPI
Published
Apr 21, 2026
Tracked Since
Apr 21, 2026