jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. Prior to version 4.4.8, links generated with LaTeX typesetters in Markdown files and Markdown cells in JupyterLab and Jupyter Notebook did not include the noopener attribute. This is deemed to have no impact on the default installations. Theoretically users of third-party LaTeX-rendering extensions could find themselves vulnerable to reverse tabnabbing attacks if links generated by those extensions included target=_blank (no such extensions are known at time of writing) and they were to click on a link generated in LaTeX (typically visibly different from other links). This issue has been patched in version 4.4.8.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/jupyterlab/jupyterlab/commit/88ef373039a8cc09f27d3814382a512d9033675c | Patch | 
| https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-vvfj-2jqx-52jm | Patch Third Party Advisory | 
Configurations
                    History
                    22 Oct 2025, 16:27
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Jupyter jupyterlab Jupyter | |
| References | () https://github.com/jupyterlab/jupyterlab/commit/88ef373039a8cc09f27d3814382a512d9033675c - Patch | |
| References | () https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-vvfj-2jqx-52jm - Patch, Third Party Advisory | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.3 | 
| CPE | cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:* | 
26 Sep 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-09-26 16:15
Updated : 2025-10-22 16:27
NVD link : CVE-2025-59842
Mitre link : CVE-2025-59842
CVE.ORG link : CVE-2025-59842
JSON object : View
Products Affected
                jupyter
- jupyterlab
CWE
                
                    
                        
                        CWE-1022
                        
            Use of Web Link to Untrusted Target with window.opener Access
