CVE-2025-53000

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. This issue has been patched in version 7.17.0.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:jupyter:nbconvert:*:*:*:*:*:python:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

18 Feb 2026, 19:21

Type Values Removed Values Added
References
  • () https://github.com/jupyter/nbconvert/security/advisories/GHSA-xm59-rqc7-hhvf -

09 Feb 2026, 22:16

Type Values Removed Values Added
Summary (en) The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. As of time of publication, no known patches exist. (en) The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. This issue has been patched in version 7.17.0.
References
  • () https://github.com/jupyter/nbconvert/blob/4f61702f5c7524d8a3c4ac0d5fc33a6ac2fa36a7/nbconvert/preprocessors/svg2pdf.py#L104 -
  • () https://github.com/jupyter/nbconvert/commit/c9ac1d1040459ed1ff9eb34e9918ce5a87cf9d71 -
  • () https://github.com/jupyter/nbconvert/issues/2258 -
  • () https://github.com/jupyter/nbconvert/releases/tag/v7.17.0 -

02 Jan 2026, 15:03

Type Values Removed Values Added
References () https://www.imperva.com/blog/code-execution-in-jupyter-notebook-exports - () https://www.imperva.com/blog/code-execution-in-jupyter-notebook-exports - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:jupyter:nbconvert:*:*:*:*:*:python:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
First Time Jupyter nbconvert
Jupyter
Microsoft
Microsoft windows

18 Dec 2025, 15:15

Type Values Removed Values Added
References () https://www.imperva.com/blog/code-execution-in-jupyter-notebook-exports - () https://www.imperva.com/blog/code-execution-in-jupyter-notebook-exports -

17 Dec 2025, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-17 21:16

Updated : 2026-02-18 19:21


NVD link : CVE-2025-53000

Mitre link : CVE-2025-53000

CVE.ORG link : CVE-2025-53000


JSON object : View

Products Affected

jupyter

  • nbconvert

microsoft

  • windows
CWE
CWE-427

Uncontrolled Search Path Element