Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-35397— jupyter-server path traversal allows access to sibling directories sharing root_dir name prefix

EPSS 0.04% · P11
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-35397

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
jupyter-server path traversal allows access to sibling directories sharing root_dir name prefix
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, a path traversal vulnerability in the REST API allows an authenticated user to escape the configured root_dir and access sibling directories whose names begin with the same prefix as the root_dir. For example, with a root_dir named "test", the API permits access to a sibling directory named "testtest" through a crafted request to the /api/contents endpoint using encoded path components. An attacker can read, write, and delete files in affected sibling directories. Multi-tenant deployments using predictable naming schemes are particularly at risk, as a user with a directory named "user1" could access directories for user10 through user19 and beyond. A user who can choose a single-character folder name could gain access to a significant number of sibling directories. Version 2.18.0 contains a fix. As a workaround, ensure folder names do not share a common prefix with any sibling directory.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Jupyter Server 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Jupyter Server是Jupyter组织的一款用于为Jupyter Web应用提供后端服务的应用软件。 Jupyter Server 2.17.0及之前版本存在路径遍历漏洞,该漏洞源于REST API中的路径遍历问题,可能导致经过身份验证的用户逃离配置的root_dir并访问名称以root_dir前缀开头的同级目录。以下版本受到影响:2.17.0及之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
jupyter-serverjupyter_server < 2.18.0 -

II. Public POCs for CVE-2026-35397

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-35397

登录查看更多情报信息。

Same Patch Batch · jupyter-server · 2026-05-05 · 4 CVEs total

CVE-2025-61669jupyter_server next parameter open redirect can redirect users to external domains
CVE-2026-40110jupyter-server CORS origin validation bypass via unanchored regex in allow_origin_pat
CVE-2026-40934jupyter-server authentication cookies remain valid after password reset due to static cook

IV. Related Vulnerabilities

V. Comments for CVE-2026-35397

No comments yet


Leave a comment