Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-40934— jupyter-server authentication cookies remain valid after password reset due to static cookie secret

EPSS 0.07% · P20
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-40934

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
jupyter-server authentication cookies remain valid after password reset due to static cookie secret
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the secret used to sign authentication cookies is persisted to a static file at ~/.local/share/jupyter/runtime/jupyter_cookie_secret and is never rotated when a user changes their password. After a password reset and server restart, any previously issued authentication cookie remains cryptographically valid because the signing key has not changed. An attacker who has captured a session cookie through any means retains full authenticated access to the server regardless of subsequent password changes. This affects deployments using password-based authentication, particularly shared or public-facing servers where credential rotation is expected to revoke existing sessions. This issue has been fixed in version 2.18.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不充分的会话过期机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Jupyter Server 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Jupyter Server是Jupyter组织的一款用于为Jupyter Web应用提供后端服务的应用软件。 Jupyter Server 2.17.0及之前版本存在代码问题漏洞,该漏洞源于用于签名认证cookie的密钥持久化到静态文件且用户更改密码后不轮换,可能导致攻击者通过捕获的会话cookie在密码更改后仍保持完全认证访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
jupyter-serverjupyter_server < 2.18.0 -

II. Public POCs for CVE-2026-40934

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-40934

登录查看更多情报信息。

Same Patch Batch · jupyter-server · 2026-05-05 · 4 CVEs total

CVE-2025-61669jupyter_server next parameter open redirect can redirect users to external domains
CVE-2026-35397jupyter-server path traversal allows access to sibling directories sharing root_dir name p
CVE-2026-40110jupyter-server CORS origin validation bypass via unanchored regex in allow_origin_pat

IV. Related Vulnerabilities

V. Comments for CVE-2026-40934

No comments yet


Leave a comment