๐Ÿ” CVE Alert

CVE-2026-42266

HIGH 8.8

jupyterlab: Extension Manager API/GUI Policy Discrepancy allowing 3rd party (malicious) extensions install via POST request.

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions_uris) is not correctly enforced by JupyterLab. The PyPI Extension Manager was not contained to packages listed on the default PyPI index. This vulnerability is fixed in 4.5.7.

CWE CWE-88 CWE-602
Vendor jupyterlab
Product jupyterlab
Published May 13, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for jupyterlab jupyterlab

Be the first to know when new high vulnerabilities affecting jupyterlab jupyterlab are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

jupyterlab / jupyterlab
>= 4.0.0, < 4.5.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-37w4-hwhx-4rc4