<0.1% probability · 19.6th percentile — 2026-05-12
Affected versions
Open Notebook v1.8.3 (Docker containerized deployments)
Summary
This vulnerability is caused by insufficient input sanitization for user-created transformations in Open Notebook v1.8.3. It allows an authenticated application user to inject malicious template payloads, leading to arbitrary Python and operating system command execution on the hosting Docker container. Full compromise of the container instance is possible.
Remediation
Upgrade Open Notebook to a patched version that fixes the input sanitization issue. If no patch is available immediately, restrict application access to only trusted users. Add network segmentation to limit the vulnerable container's access to other infrastructure resources.
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.