PT-2026-37241 · Project Jupyter · Jupyter Server

Emin63

·

Published

2026-05-05

·

Updated

2026-05-05

·

CVE-2026-40934

CVSS v4.0

7.6

High

VectorAV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions Jupyter Server versions prior to 2.18.0
Description The secret used to sign authentication cookies is persisted to a static file at ~/.local/share/jupyter/runtime/jupyter cookie secret and is not rotated when a user changes their password. Consequently, after a password reset and server restart, any previously issued authentication cookie remains cryptographically valid. An attacker who has captured a session cookie retains full authenticated access to the server regardless of subsequent password changes. This affects deployments using password-based authentication, particularly shared or public-facing servers where credential rotation is expected to revoke existing sessions.
Recommendations Update to version 2.18.0 or later. As a temporary workaround, delete the file ~/.local/share/jupyter/runtime/jupyter cookie secret and restart the server.

Fix

Insufficient Session Expiration

Weakness Enumeration

Related Identifiers

CVE-2026-40934
GHSA-5MRQ-X3X5-8V8F

Affected Products

Jupyter Server