CVE-2025-53000
Unknown Unknown - Not Provided
Arbitrary Code Execution in nbconvert PDF Conversion on Windows

Publication date: 2025-12-17

Last updated on: 2026-02-18

Assigner: GitHub, Inc.

Description
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. This issue has been patched in version 7.17.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-17
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2025-12-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jupyter nbconvert 7.16.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the nbconvert tool used by Jupyter to convert notebooks to other formats. On Windows, when converting a notebook containing SVG output to PDF, a malicious third party can place a file named 'inkscape.bat' in the directory. This batch script is then executed unexpectedly during the conversion process, allowing unauthorized arbitrary code execution.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized code execution on a Windows system when converting Jupyter notebooks with SVG output to PDF. An attacker could exploit this by placing a malicious 'inkscape.bat' file in the working directory, which would run arbitrary code with the user's privileges, potentially compromising the system or data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves checking for the presence of a malicious 'inkscape.bat' file in directories where Jupyter notebooks with SVG output are converted to PDF on Windows systems. You can search for 'inkscape.bat' files in relevant directories using commands like 'dir /s inkscape.bat' in Command Prompt or 'Get-ChildItem -Path . -Filter inkscape.bat -Recurse' in PowerShell. Monitoring execution of 'inkscape.bat' during 'jupyter nbconvert --to pdf' operations may also help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding converting notebooks containing SVG output to PDF on Windows platforms using 'jupyter nbconvert' until a patch is available. Additionally, ensure that no untrusted 'inkscape.bat' files exist in directories where conversions are performed. Running conversions in isolated or controlled environments and restricting write permissions to prevent creation of malicious batch files can also reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart