Jupyter Notebook instances lacking a CSP header allow XSS attacks via crafted SVG files, enabling session hijacking and credential theft in shared ML environments. In data science teams where Jupyter is deployed on internal networks — often without authentication — this is a realistic lateral movement vector. Upgrade to 5.5.0+ immediately and ensure all Jupyter deployments sit behind authenticated reverse proxies.
Risk Assessment
CVSS 5.3 understates real-world risk in AI/ML contexts. The attack vector requires no privileges and no user interaction (AV:N/AC:L/PR:N/UI:N), and Jupyter is routinely deployed as a shared service on internal networks. Low EPSS (0.37%) suggests limited active exploitation in the wild, but the technique is trivial — any attacker with file upload access can compromise all active sessions on the server. Shared notebook environments used by multiple data scientists amplify blast radius significantly.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| notebook | pip | < 5.5.0rc1 | 5.5.0rc1 |
Do you use notebook? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Upgrade to notebook >= 5.5.0 (applies CSP header treating served files as separate origin).
-
If upgrade is blocked, enforce authenticated reverse proxy (nginx + auth_request) in front of all Jupyter instances.
-
Disable serving of untrusted file types via Jupyter's content manager configuration.
-
Enforce network segmentation: Jupyter servers must not be internet-accessible or accessible from untrusted VLANs.
-
Audit asset inventory for exposed Jupyter instances using internal port scans (default port 8888).
-
Detection: alert on SVG file creation/upload events on notebook servers and monitor for unusual outbound requests originating from browser sessions on Jupyter hosts.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2018-21030?
Jupyter Notebook instances lacking a CSP header allow XSS attacks via crafted SVG files, enabling session hijacking and credential theft in shared ML environments. In data science teams where Jupyter is deployed on internal networks — often without authentication — this is a realistic lateral movement vector. Upgrade to 5.5.0+ immediately and ensure all Jupyter deployments sit behind authenticated reverse proxies.
Is CVE-2018-21030 actively exploited?
No confirmed active exploitation of CVE-2018-21030 has been reported, but organizations should still patch proactively.
How to fix CVE-2018-21030?
1. Upgrade to notebook >= 5.5.0 (applies CSP header treating served files as separate origin). 2. If upgrade is blocked, enforce authenticated reverse proxy (nginx + auth_request) in front of all Jupyter instances. 3. Disable serving of untrusted file types via Jupyter's content manager configuration. 4. Enforce network segmentation: Jupyter servers must not be internet-accessible or accessible from untrusted VLANs. 5. Audit asset inventory for exposed Jupyter instances using internal port scans (default port 8888). 6. Detection: alert on SVG file creation/upload events on notebook servers and monitor for unusual outbound requests originating from browser sessions on Jupyter hosts.
What systems are affected by CVE-2018-21030?
This vulnerability affects the following AI/ML architecture patterns: data science notebooks, model development environments, training pipelines, experiment tracking infrastructure.
What is the CVSS score for CVE-2018-21030?
CVE-2018-21030 has a CVSS v3.1 base score of 5.3 (MEDIUM). The EPSS exploitation probability is 0.37%.
Technical Details
NVD Description
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
Exploitation Scenario
An attacker with any write access to a shared Jupyter environment — compromised data scientist account, insider, or misconfigured S3 bucket mounted as a notebook directory — uploads a malicious SVG containing JavaScript. When a colleague opens or previews the file via the Jupyter file browser, the script executes in the notebook server's origin, sharing context with all authenticated sessions. The attacker harvests session cookies, exfiltrates .ipynb files containing hardcoded cloud credentials and model code, and pivots to connected services (MLflow, Weights & Biases, S3, GCP) using stolen tokens embedded in notebooks.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References
- github.com/advisories/GHSA-jqwc-jm56-wcwj
- github.com/jupyter/notebook/commit/e321c80776542b8d6f3411af16f9e21e51e27687
- github.com/jupyter/notebook/pull/3341
- github.com/jupyter/notebook/releases/tag/5.5.0
- github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2019-157.yaml
- lists.debian.org/debian-lts-announce/2020/11/msg00033.html
- nvd.nist.gov/vuln/detail/CVE-2018-21030
Timeline
Related Vulnerabilities
CVE-2026-42266 8.8 JupyterLab: Extension allow-list bypass enables privesc
Same package: notebook CVE-2018-8768 7.8 Jupyter Notebook: XSS via malicious .ipynb file
Same package: notebook CVE-2026-35397 7.1 Jupyter Server: path traversal leaks sibling directories
Same package: notebook CVE-2026-39377 6.5 Analysis pending
Same package: notebook CVE-2026-39378 6.5 Analysis pending
Same package: notebook
AI Threat Alert