Lack of user input sanitisation in Open Notebook v1.8.3 allows the application user to execute Python code (and subsequently OS commands) on the docker container via Server-Side Template Injection (SSTI) for user-created transformations.
History

Thu, 07 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 May 2026 11:00:00 +0000

Type Values Removed Values Added
Description Lack of user input sanitisation in Open Notebook v1.8.3 allows the application user to execute Python code (and subsequently OS commands) on the docker container via Server-Side Template Injection (SSTI) for user-created transformations.
Title Remote Code Execution (RCE) via Server-Side Template Injection (SSTI)
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ENISA

Published:

Updated: 2026-05-07T11:35:45.879Z

Reserved: 2026-03-23T12:53:47.474Z

Link: CVE-2026-33587

cve-icon Vulnrichment

Updated: 2026-05-07T11:35:41.699Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T11:16:00.887

Modified: 2026-05-07T14:51:53.657

Link: CVE-2026-33587

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T13:00:10Z