๐Ÿ” CVE Alert

CVE-2026-42557

UNKNOWN 0.0

jupyterlab: Command linker attributes in HTML enable one-click command execution from untrusted content

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. Prior to 4.5.7, JupyterLab's HTML sanitizer allowlists data-commandlinker-command and data-commandlinker-args on button elements, while CommandLinker listens for all click events on document.body and executes the named command without checking whether the element came from trusted JupyterLab UI. A notebook with a pre-saved HTML cell output containing a deceptive button can trigger arbitrary JupyterLab commands - including arbitrary code execution - on a single user click, without any code being submitted for execution by the user. This vulnerability is fixed in 4.5.7.

CWE CWE-79
Vendor jupyterlab
Product jupyterlab
Published May 13, 2026
Stay Ahead of the Next One

Get instant alerts for jupyterlab jupyterlab

Be the first to know when new unknown vulnerabilities affecting jupyterlab jupyterlab are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

jupyterlab / jupyterlab
< 4.5.7
jupyter / notebook
>= 7.0.0, < 7.5.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-mqcg-5x36-vfcg