CVE-2021-32797
Python vulnerability analysis and mitigation

Overview

JupyterLab, a user interface for Project Jupyter, was found to contain a vulnerability where untrusted notebooks could execute code on load. The vulnerability (CVE-2021-32797) was discovered by Guillaume Jeanne from Google and affected all published versions of JupyterLab at the time the CVE was received. The core issue stemmed from JupyterLab's failure to properly sanitize the action attribute of HTML form tags, which could potentially lead to remote code execution (GitHub Advisory).

Technical details

The vulnerability involves the improper sanitization of HTML form tags, specifically the action attribute. This security flaw allowed for triggering form validation outside of the form itself, potentially leading to code execution. The issue was addressed by removing the form tags' action attribute during sanitizing, as evidenced in the security patch (GitHub Commit). The vulnerability has been classified with CWE-75 and CWE-87 weaknesses (GitHub Advisory).

Impact

The vulnerability could allow remote code execution (RCE) when a user opens a malicious notebook. While this represents a significant security risk, it's important to note that the exploit requires user interaction to open the compromised notebook (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in multiple versions of JupyterLab: 3.1.4, 3.0.17, 2.3.2, 2.2.10, and 1.2.21. Users are advised to upgrade to these patched versions or later to mitigate the security risk (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23949HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 20, 2026
CVE-2026-22219HIGH8.3
  • PythonPython
  • chainlit
NoYesJan 20, 2026
CVE-2026-23842HIGH7.5
  • PythonPython
  • chatterbot
NoYesJan 19, 2026
CVE-2026-23877MEDIUM5.3
  • PythonPython
  • swingmusic
NoYesJan 19, 2026
CVE-2026-23833LOW1.7
  • PythonPython
  • esphome
NoYesJan 19, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management