TopVuln

High-risk vulnerability digests

CVE-2026-33587

  • CRITICAL

Details

CVSS v4
9.2
NVD published
2026-05-07 11:16:00
EPSS
<0.1% probability · 19.6th percentile — 2026-05-12
Affected versions
Open Notebook v1.8.3 (Docker containerized deployments)
Summary
This vulnerability is caused by insufficient input sanitization for user-created transformations in Open Notebook v1.8.3. It allows an authenticated application user to inject malicious template payloads, leading to arbitrary Python and operating system command execution on the hosting Docker container. Full compromise of the container instance is possible.
Remediation
Upgrade Open Notebook to a patched version that fixes the input sanitization issue. If no patch is available immediately, restrict application access to only trusted users. Add network segmentation to limit the vulnerable container's access to other infrastructure resources.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.