Open Redirect Affecting @jupyterlab/help-extension package, versions <4.5.7


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-JUPYTERLABHELPEXTENSION-16347193
  • published3 May 2026
  • disclosed30 Apr 2026
  • creditDaniel Teixeira

Introduced: 30 Apr 2026

NewCVE-2026-40171  (opens in a new tab)
CWE-601  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade @jupyterlab/help-extension to version 4.5.7 or higher.

Overview

@jupyterlab/help-extension is a JupyterLab - Help Extension

Affected versions of this package are vulnerable to Open Redirect in the CommandLinker class. An attacker can steal authentication tokens and gain unauthorized access to user accounts by convincing a user to open a malicious notebook file and interact with a malicious element, that execute arbitrary scripts. This graphical element can be made indistinguishable from legitimate ones. The exploit may allow reading, modifying, or creating files, accessing running kernels, and creating terminals for shell access.

Note: The upgraded versions also include an option to disable command linking completely by setting

{
  "@jupyterlab/apputils-extension:sanitizer": {
    "allowCommandLinker": false
  }
}

CVSS Base Scores

version 4.0
version 3.1