jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. Prior to version 4.4.8, links generated with LaTeX typesetters in Markdown files and Markdown cells in JupyterLab and Jupyter Notebook did not include the noopener attribute. This is deemed to have no impact on the default installations. Theoretically users of third-party LaTeX-rendering extensions could find themselves vulnerable to reverse tabnabbing attacks if links generated by those extensions included target=_blank (no such extensions are known at time of writing) and they were to click on a link generated in LaTeX (typically visibly different from other links). This issue has been patched in version 4.4.8.
CVSS
No CVSS.
References
Configurations
No configuration.
History
26 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-26 16:15
Updated : 2025-09-29 19:34
NVD link : CVE-2025-59842
Mitre link : CVE-2025-59842
CVE.ORG link : CVE-2025-59842
JSON object : View
Products Affected
No product.
CWE
CWE-1022
Use of Web Link to Untrusted Target with window.opener Access