logo

CVE-2025-30167 jupyter_core

Package

Manager: pip
Name: jupyter_core
Vulnerable Version: >=0 <5.8.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00014 pctl0.01882

Details

Jupyter Core on Windows Has Uncontrolled Search Path Element Local Privilege Escalation Vulnerability ## Impact On Windows, the shared `%PROGRAMDATA%` directory is searched for configuration files (`SYSTEM_CONFIG_PATH` and `SYSTEM_JUPYTER_PATH`), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected `%PROGRAMDATA%` are affected. ## Mitigations - upgrade to `jupyter_core>=5.8.1` (5.8.0 is patched but breaks `jupyter-server`) , or - as administrator, modify the permissions on the `%PROGRAMDATA%` directory so it is not writable by unauthorized users, or - as administrator, create the `%PROGRAMDATA%\jupyter` directory with appropriately restrictive permissions, or - as user or administrator, set the `%PROGRAMDATA%` environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators _or_ the current user) ## Credit Reported via Trend Micro Zero Day Initiative as ZDI-CAN-25932

Metadata

Created: 2025-06-04T21:00:23Z
Modified: 2025-06-04T21:00:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-33p9-3p43-82vq/GHSA-33p9-3p43-82vq.json
CWE IDs: ["CWE-427"]
Alternative ID: GHSA-33p9-3p43-82vq
Finding: F098
Auto approve: 1