๐Ÿ” CVE Alert

CVE-2026-40934

UNKNOWN 0.0

jupyter-server authentication cookies remain valid after password reset due to static cookie secret

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the secret used to sign authentication cookies is persisted to a static file at ~/.local/share/jupyter/runtime/jupyter_cookie_secret and is never rotated when a user changes their password. After a password reset and server restart, any previously issued authentication cookie remains cryptographically valid because the signing key has not changed. An attacker who has captured a session cookie through any means retains full authenticated access to the server regardless of subsequent password changes. This affects deployments using password-based authentication, particularly shared or public-facing servers where credential rotation is expected to revoke existing sessions. This issue has been fixed in version 2.18.0.

CWE CWE-613
Vendor jupyter-server
Product jupyter_server
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for jupyter-server jupyter_server

Be the first to know when new unknown vulnerabilities affecting jupyter-server jupyter_server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

jupyter-server / jupyter_server
< 2.18.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-5mrq-x3x5-8v8f