Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53000: CWE-427: Uncontrolled Search Path Element in jupyter nbconvert

0
High
VulnerabilityCVE-2025-53000cvecve-2025-53000cwe-427
Published: Wed Dec 17 2025 (12/17/2025, 20:27:59 UTC)
Source: CVE Database V5
Vendor/Project: jupyter
Product: nbconvert

Description

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. This issue has been patched in version 7.17.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 12:40:18 UTC

Technical Analysis

The vulnerability CVE-2025-53000 affects the jupyter nbconvert tool, specifically versions up to 7.16.6 on Windows platforms. Nbconvert converts Jupyter notebooks into various formats using Jinja templates. When converting notebooks that include SVG output to PDF format, the tool invokes Inkscape to process the SVG content. On Windows, the conversion process searches for the inkscape executable in the current working directory before the system path. An attacker can exploit this by placing a malicious inkscape.bat batch script in the directory where the conversion is run. Because Windows prioritizes batch files in the current directory, nbconvert inadvertently executes this malicious script, leading to arbitrary code execution under the context of the user running the conversion. This is an example of an uncontrolled search path element vulnerability (CWE-427), where the application trusts the presence of executables in the current directory without proper validation. The vulnerability does not require elevated privileges or prior authentication but does require the user to run the conversion command on a notebook containing SVG output. The issue was patched in nbconvert version 7.17.0 by correcting the search path handling to prevent execution of untrusted batch files. The CVSS 4.0 base score is 8.5 (high), reflecting the high impact on confidentiality, integrity, and availability, combined with the requirement for user interaction and local access. No known exploits have been reported in the wild as of publication.

Potential Impact

This vulnerability can lead to arbitrary code execution on Windows systems running vulnerable versions of nbconvert, potentially allowing attackers to execute malicious commands with the privileges of the user performing the notebook conversion. This can compromise confidentiality by exposing sensitive data, integrity by modifying files or code, and availability by disrupting workflows or damaging systems. Since Jupyter notebooks are widely used in data science, research, and education, organizations relying on nbconvert for automated or manual notebook conversions are at risk. Attackers could leverage this vulnerability to implant persistent malware, steal intellectual property, or disrupt critical data processing pipelines. The requirement for user interaction and local access limits remote exploitation but does not eliminate risk in multi-user environments or where users may unknowingly run conversions from untrusted directories. The vulnerability is particularly impactful in Windows environments where batch file execution precedence can be abused. The absence of known exploits suggests limited active exploitation but does not reduce the urgency to patch.

Mitigation Recommendations

Organizations should immediately upgrade jupyter nbconvert to version 7.17.0 or later, where the vulnerability is patched. Until upgrading, users should avoid running nbconvert --to pdf commands on notebooks containing SVG output from directories that are not fully trusted or controlled. Implement strict directory hygiene by ensuring no untrusted batch or executable files exist in working directories used for notebook conversion. Employ endpoint protection solutions that monitor and block suspicious batch file executions, especially in user directories. Educate users about the risks of running conversions from untrusted locations and encourage use of isolated or sandboxed environments for notebook processing. Consider restricting write permissions on directories used for conversions to prevent unauthorized file placement. Regularly audit and monitor systems for unexpected batch files or scripts in user directories. Finally, integrate nbconvert usage into broader application whitelisting and execution control policies to reduce risk of arbitrary code execution.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-24T03:50:36.795Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694315f3c9138a40d2f24a5e

Added to database: 12/17/2025, 8:43:31 PM

Last enriched: 2/19/2026, 12:40:18 PM

Last updated: 3/24/2026, 12:49:50 AM

Views: 135

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses