CVE-2026-33587
Undergoing Analysis Undergoing Analysis - In Progress
Server-Side Template Injection in Open Notebook

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: ENISA

Description
Lack of user input sanitisation in Open Notebook v1.8.3 allows the application user to execute Python code (and subsequently OS commands) on the docker container via Server-Side Template Injection (SSTI) for user-created transformations.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-07
AI Q&A
2026-05-07
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
lfnovo open_notebook to 1.8.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33587 is a critical Remote Code Execution (RCE) vulnerability in the open-notebook package version 1.8.3 and earlier. It occurs due to lack of user input sanitisation in the Jinja2 template rendering used for user-created transformations. An authenticated attacker can inject malicious Jinja2 expressions that execute arbitrary Python code on the server running inside a Docker container.

This vulnerability arises from unsandboxed template rendering via the ai-prompter library, allowing attackers to run arbitrary system commands, access environment variables (including sensitive encryption keys), and read or write files within the container.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including Remote Code Execution within the Docker container hosting the application. An attacker can execute arbitrary system commands, access sensitive environment variables such as encryption keys, and read or modify any files on the container filesystem.

Such capabilities can lead to full compromise of the container environment, potentially allowing attackers to escalate privileges, steal sensitive data, disrupt service availability, or use the compromised system as a pivot point for further attacks.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves Server-Side Template Injection (SSTI) in Open Notebook versions 1.8.3 and earlier, allowing execution of arbitrary Python code via malicious Jinja2 expressions in user-created transformations.

To detect exploitation attempts or presence of this vulnerability, you can monitor logs for suspicious Jinja2 template expressions or unusual command executions within the Docker container running Open Notebook.

  • Check application logs for suspicious template strings such as '{{cycler.__init__.__globals__.os.popen('id').read()}}' or other Jinja2 expressions.
  • Within the Docker container, run commands to check for unexpected processes or commands, for example: `ps aux` or `top`.
  • Use container inspection commands to look for unusual file changes or access, e.g., `docker exec <container_id> ls -la /path/to/app`.
  • Monitor network traffic for unusual outbound connections from the container that might indicate command execution.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Open Notebook to version 1.8.4 or later, where the vulnerability is patched by updating the ai-prompter dependency to version 0.4.0, which uses Jinja2's SandboxedEnvironment to prevent arbitrary code execution.

Until the upgrade can be applied, restrict access to the Open Notebook application to trusted users only, as the vulnerability requires authentication.

Consider isolating the Docker container and monitoring for suspicious activity to limit potential damage.

Review and sanitize any user-created transformation inputs if possible to prevent injection of malicious templates.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an attacker to execute arbitrary code within the Docker container, potentially leading to unauthorized access to environment variables, including encryption keys, and arbitrary file read/write operations. Such unauthorized access and control over sensitive data and system integrity can result in violations of data protection regulations like GDPR and HIPAA, which mandate strict controls over personal and sensitive information.

Specifically, the compromise of confidentiality, integrity, and availability of data due to this Remote Code Execution (RCE) vulnerability could lead to non-compliance with these standards, as they require safeguarding data against unauthorized access and ensuring system security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart