Bug 2423383 (CVE-2025-53000) - CVE-2025-53000 nbconvert: nbconvert: Arbitrary code execution via malicious SVG to PDF conversion on Windows
Summary: CVE-2025-53000 nbconvert: nbconvert: Arbitrary code execution via malicious S...
Keywords:
Status: NEW
Alias: CVE-2025-53000
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-12-17 21:02 UTC by OSIDB Bzimport
Modified: 2025-12-18 15:13 UTC (History)
13 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-12-17 21:02:25 UTC
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. As of time of publication, no known patches exist.


Note You need to log in before you can comment on or make changes to this bug.