Home » Database

AVID-2026-R0814

Description

JupyterLab: XSS due to lack of sanitization of the action attribute of an html

(CVE-2021-32797)

Details

JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html <form>. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.

Reason for inclusion in AVID: CVE-2021-32797 describes a software vulnerability (XSS leading to remote code execution) in JupyterLab, a core UI/tooling used in ML workflows. This affects a component commonly used to build, run, and deploy AI systems, representing a software supply-chain issue within AI stacks (not hardware/firmware). The report provides CVE details and references, indicating a security vulnerability with actionable impact.

References

Affected or Relevant Artifacts

  • Developer: jupyterlab
  • Deployer: jupyterlab
  • Artifact Details:
TypeName
Systemjupyterlab

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Base Score7.4
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionREQUIRED
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity ImpactNONE
Availability ImpactNONE

CWE

IDDescription
CWE-79CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-08-09
  • Version: 0.3.3
  • AVID Entry