The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. In versions 6.5 through 7.17.0, when `HTMLExporter.embed_images=True`, nbconvert's markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML. nbconvert 7.17.1 contains a fix. As a workaround, do not enable `HTMLExporter.embed_images`; it is not enabled by default.
History

Tue, 21 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Jupyter
Jupyter nbconvert
Vendors & Products Jupyter
Jupyter nbconvert

Tue, 21 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. In versions 6.5 through 7.17.0, when `HTMLExporter.embed_images=True`, nbconvert's markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML. nbconvert 7.17.1 contains a fix. As a workaround, do not enable `HTMLExporter.embed_images`; it is not enabled by default.
Title nbconvert has an Arbitrary File Read via Path Traversal in HTMLExporter Image Embedding
Weaknesses CWE-22
CWE-73
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T00:17:00.684Z

Reserved: 2026-04-06T21:29:17.350Z

Link: CVE-2026-39378

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-21T01:16:06.073

Modified: 2026-04-21T01:16:06.073

Link: CVE-2026-39378

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:30:25Z