CVE-2025-53000
Arbitrary Code Execution in nbconvert PDF Conversion on Windows
Publication date: 2025-12-17
Last updated on: 2026-02-18
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jupyter | nbconvert | 7.16.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in the nbconvert tool used by Jupyter to convert notebooks to other formats. On Windows, when converting a notebook containing SVG output to PDF, a malicious third party can place a file named 'inkscape.bat' in the directory. This batch script is then executed unexpectedly during the conversion process, allowing unauthorized arbitrary code execution.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized code execution on a Windows system when converting Jupyter notebooks with SVG output to PDF. An attacker could exploit this by placing a malicious 'inkscape.bat' file in the working directory, which would run arbitrary code with the user's privileges, potentially compromising the system or data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves checking for the presence of a malicious 'inkscape.bat' file in directories where Jupyter notebooks with SVG output are converted to PDF on Windows systems. You can search for 'inkscape.bat' files in relevant directories using commands like 'dir /s inkscape.bat' in Command Prompt or 'Get-ChildItem -Path . -Filter inkscape.bat -Recurse' in PowerShell. Monitoring execution of 'inkscape.bat' during 'jupyter nbconvert --to pdf' operations may also help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding converting notebooks containing SVG output to PDF on Windows platforms using 'jupyter nbconvert' until a patch is available. Additionally, ensure that no untrusted 'inkscape.bat' files exist in directories where conversions are performed. Running conversions in isolated or controlled environments and restricting write permissions to prevent creation of malicious batch files can also reduce risk. [1]