CVE-2025-30167: Jupyter Core on Windows Has Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
On Windows, the shared %PROGRAMDATA%
directory is searched for configuration files (SYSTEM_CONFIG_PATH
and SYSTEM_JUPYTER_PATH
), which may allow users to create configuration files affecting other users.
Only shared Windows systems with multiple users and unprotected %PROGRAMDATA%
are affected.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-30167 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →