Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53000: CWE-427 Uncontrolled Search Path Element in jupyter nbconvert

0
High
VulnerabilityCVE-2025-53000cvecve-2025-53000cwe-427
Published: Wed Dec 17 2025 (12/17/2025, 20:27:59 UTC)
Source: CVE Database V5
Vendor/Project: jupyter
Product: nbconvert

Description

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. As of time of publication, no known patches exist.

AI-Powered Analysis

AILast updated: 12/24/2025, 21:50:37 UTC

Technical Analysis

The vulnerability CVE-2025-53000 affects the Jupyter nbconvert tool, specifically versions up to and including 7.16.6 on Windows. Nbconvert converts Jupyter notebooks into various formats using Jinja templates. When converting notebooks containing SVG output to PDF, nbconvert relies on external tools like Inkscape to process SVG images. The vulnerability is due to an uncontrolled search path element (CWE-427) where nbconvert executes an inkscape.bat file if present in the current working directory. An attacker with write access to the directory can place a malicious inkscape.bat batch script that will be executed when the user runs the conversion command `jupyter nbconvert --to pdf`. This results in arbitrary code execution with the privileges of the user running the command. The attack requires user interaction (running the conversion) but no prior authentication or elevated privileges. No patches or fixes are currently available, increasing the risk of exploitation. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This vulnerability could be exploited in environments where users convert notebooks containing SVG images on Windows systems, potentially leading to system compromise or data breaches.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors relying heavily on Jupyter notebooks for data analysis, scientific research, and education. Unauthorized code execution can lead to data theft, system compromise, lateral movement within networks, and disruption of critical workflows. Given the widespread use of Jupyter in academia and industry, exploitation could affect intellectual property, sensitive research data, and operational continuity. Windows-based environments are particularly vulnerable, and organizations using shared or multi-user systems where attackers might place malicious batch files are at higher risk. The lack of patches means organizations must rely on mitigations to prevent exploitation. The impact extends to confidentiality, integrity, and availability of affected systems, potentially causing reputational damage and regulatory compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

1. Avoid converting notebooks containing SVG output to PDF on Windows systems until a patch is released. 2. Run nbconvert commands in isolated or sandboxed environments to limit the impact of potential code execution. 3. Implement strict directory permissions and monitor working directories for unauthorized batch files named inkscape.bat or similar. 4. Educate users about the risk of running nbconvert on untrusted directories or notebooks. 5. Use alternative conversion workflows that do not rely on Inkscape or that run on non-Windows platforms where the vulnerability does not exist. 6. Employ endpoint detection and response (EDR) tools to detect suspicious script execution. 7. Regularly audit and clean temporary and working directories used for notebook conversions. 8. Monitor official Jupyter and nbconvert channels for patches or updates addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-24T03:50:36.795Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694315f3c9138a40d2f24a5e

Added to database: 12/17/2025, 8:43:31 PM

Last enriched: 12/24/2025, 9:50:37 PM

Last updated: 2/7/2026, 6:47:26 PM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats