CVE-2024-22421
Python vulnerability analysis and mitigation

Overview

JupyterLab, an extensible environment for interactive and reproducible computing based on the Jupyter Notebook and Architecture, was found to contain a security vulnerability identified as CVE-2024-22421. The vulnerability was discovered and disclosed in January 2024, affecting JupyterLab versions prior to 4.0.11, 3.6.7, and 4.1.0b2. When users click on a malicious link while running an older jupyter-server version, their Authorization and XSRFToken tokens could potentially be exposed to unauthorized third parties (GitHub Advisory).

Technical details

The vulnerability was assigned a CVSS v3.1 base score of 7.6 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L. The issue is classified under CWE-23 (Relative Path Traversal) and CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability specifically involves the potential exposure of authentication and CSRF tokens when a user interacts with maliciously crafted links (NVD).

Impact

If exploited, this vulnerability could lead to the exposure of sensitive authentication tokens (Authorization) and CSRF protection tokens (XSRFToken) to unauthorized third parties. This exposure could potentially allow attackers to hijack user sessions or bypass CSRF protections (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7. While no direct workaround has been identified, users are strongly advised to upgrade their jupyter-server to version 2.7.2 or newer, which includes a fix for the redirect vulnerability. The fix has also been incorporated into various distribution packages, including Fedora 39 (Fedora Update).

Community reactions

The vulnerability was reported through the European Commission's bug bounty program hosted on the Intigriti platform by user @davwwwx (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22612HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22609HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22608HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22690LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management