Wiz Agents & Workflows are here

CVE-2025-30370
Python vulnerability analysis and mitigation

Overview

jupyterlab-git is a JupyterLab extension for version control using Git. A command injection vulnerability was discovered that affects versions up to and including 0.51.0. On many platforms, if a user starts jupyter-lab in a parent directory of a Git repository with a name containing shell command substitution syntax ($()), clicking 'Git > Open Git Repository in Terminal' executes the injected command in the user's shell without permission. The vulnerability was disclosed on April 3, 2025, and has been fixed in version 0.51.1 (GitHub Advisory).

Technical details

The vulnerability occurs because when opening a Git repository in terminal, jupyterlab-git runs the cd command through the shell to set the current directory. If the repository name contains command substitution syntax ($()), these commands are executed by the shell. The issue affects macOS and most Linux distributions where such directory names are allowed. The vulnerability has been assigned CVE-2025-30370 with a CVSS v3.1 score of 7.4 (High), based on vector CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H (GitHub Advisory).

Impact

This vulnerability allows for arbitrary code execution via command injection. An attacker can exploit this to perform various malicious actions including modifying files, exfiltrating data, halting services, or compromising the server's security rules. The impact is significant as it provides unauthorized access to execute commands with the privileges of the JupyterLab user (GitHub Advisory).

Mitigation and workarounds

Users should upgrade to version 0.51.1 or later which contains the fix. For users unable to upgrade, three workaround options are available: 1) Disable terminals on jupyter-server level by setting c.ServerApp.terminals_enabled = False, 2) Disable the terminals server extension using 'jupyter server extension disable jupyter_server_terminals', or 3) Disable the lab extension using 'jupyter labextension disable @jupyterlab/terminal-extension' (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33641HIGH7.8
  • PythonPython
  • glances
NoNoMar 30, 2026
CVE-2026-34070HIGH7.5
  • PythonPython
  • langchain-core
NoYesMar 31, 2026
CVE-2026-34231MEDIUM6.1
  • PythonPython
  • slippers
NoYesMar 30, 2026
CVE-2026-34073LOW1.7
  • PythonPython
  • apache-beam-python-3.13-sdk
NoYesMar 31, 2026
GHSA-955r-262c-33jcCRITICALN/A
  • PythonPython
  • telnyx
NoNoMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management