jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. Prior to version 4.4.8, links generated with LaTeX typesetters in Markdown files and Markdown cells in JupyterLab and Jupyter Notebook did not include the noopener attribute. This is deemed to have no impact on the default installations. Theoretically users of third-party LaTeX-rendering extensions could find themselves vulnerable to reverse tabnabbing attacks if links generated by those extensions included target=_blank (no such extensions are known at time of writing) and they were to click on a link generated in LaTeX (typically visibly different from other links). This issue has been patched in version 4.4.8.
References
| Link | Resource |
|---|---|
| https://github.com/jupyterlab/jupyterlab/commit/88ef373039a8cc09f27d3814382a512d9033675c | Patch |
| https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-vvfj-2jqx-52jm | Patch Third Party Advisory |
Configurations
History
22 Oct 2025, 16:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jupyter jupyterlab
Jupyter |
|
| CPE | cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:* | |
| References | () https://github.com/jupyterlab/jupyterlab/commit/88ef373039a8cc09f27d3814382a512d9033675c - Patch | |
| References | () https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-vvfj-2jqx-52jm - Patch, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
26 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-26 16:15
Updated : 2025-10-22 16:27
NVD link : CVE-2025-59842
Mitre link : CVE-2025-59842
CVE.ORG link : CVE-2025-59842
JSON object : View
Products Affected
jupyter
- jupyterlab
CWE
CWE-1022
Use of Web Link to Untrusted Target with window.opener Access
