Client-Side Enforcement of Server-Side Security Affecting jupyterlab package, versions [,4.5.7)[4.6.0a4, 4.6.0a5)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-JUPYTERLAB-16425771
  • published6 May 2026
  • disclosed5 May 2026
  • creditPhuong Cao

Introduced: 5 May 2026

NewCVE-2026-42266  (opens in a new tab)
CWE-602  (opens in a new tab)
CWE-88  (opens in a new tab)

How to fix?

Upgrade jupyterlab to version 4.5.7, 4.6.0a5 or higher.

Overview

jupyterlab is a JupyterLab computational environment.

Affected versions of this package are vulnerable to Client-Side Enforcement of Server-Side Security via improper enforcement of the allowed_extensions_uris. An attacker can gain unauthorized access to install unapproved extensions by sending crafted POST requests. This can lead to privilege escalation, data exfiltration, lateral movement within the network, and persistent compromise of the server infrastructure.

Note: This is only exploitable if the PyPI Extension Manager is enabled and the deployment relies on allow-listed extensions for security.

Workaround

This vulnerability can be mitigated by switching the extension manager to read-only mode using the command line option '--LabApp.extension_manager=readonly' or by setting the traitlet 'c.LabApp.extension_manager = "readonly"'.

CVSS Base Scores

version 4.0
version 3.1