Jupyter Server has an open redirection vulnerability in `next` query parameter
Moderate severity
GitHub Reviewed
Published
May 5, 2026
in
jupyter-server/jupyter_server
•
Updated May 8, 2026
Description
Published by the National Vulnerability Database
May 5, 2026
Published to the GitHub Advisory Database
May 5, 2026
Reviewed
May 5, 2026
Last updated
May 8, 2026
Summary
The
?next=...URL query parameter has an open redirection vulnerability. Injupyter_server<=2.17.0, this URL query parameter allows redirection to arbitrary external domains, which can be exploited to facilitate phishing attacks on server users.Details
The vulnerability is caused by insufficient validation in the
LoginFormHandler._redirect_safe()method.This vulnerability was originally reported by Noriaki Iwasaki. All discovery credit goes to them.
PoC
http://localhost:8888/login?next=///google.comgoogle.comdespite it being an external domain.The external domain passed in the
?nextparameter may be replaced with a malicious lookalike to facilitate phishing attacks. Jupyter Server deployments served on a public domain are especially vulnerable, asprod.company.commay be redirected to a look-alike URL such asprod.company.dev.Impact
This vulnerability affects all users, especially enterprise users who work with sensitive/confidential data.
Patches
Jupyter Server 2.18+
Workaround
None.
References