CVE-2026-33175
JupyterHub · OAuthenticator
OAuthenticator, used with JupyterHub for OAuth2 identity provision, contains a high-severity vulnerability that could allow for unauthorized authentication or privilege escalation.
Executive summary
A high-severity vulnerability in the JupyterHub OAuthenticator component could allow unauthorized users to bypass authentication mechanisms and access sensitive data.
Vulnerability
This vulnerability affects OAuthenticator, the software that integrates OAuth2 identity providers with JupyterHub. Given the CVSS score of 8.8, the flaw likely permits an attacker to bypass authentication or incorrectly map identities, granting them unauthorized access to JupyterHub environments.
Business impact
JupyterHub environments often contain sensitive research data, proprietary code, and access to significant compute resources. A CVSS score of 8.8 indicates a High business impact, as an attacker could gain access to these assets, leading to intellectual property theft or the misuse of organizational infrastructure.
Remediation
Immediate Action: Update OAuthenticator to the latest version immediately to ensure all OAuth2 identity checks are performed correctly.
Proactive Monitoring: Review JupyterHub login logs for any unusual authentication patterns or users gaining access without proper authorization from the configured identity provider.
Compensating Controls: Implement additional layers of authentication, such as mandatory MFA at the identity provider level, and restrict JupyterHub access to known corporate IP ranges.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The 8.8 CVSS score signifies a critical risk to any organization relying on OAuthenticator for JupyterHub security. Administrators should prioritize this update to prevent unauthorized access to their data science and research environments. Immediate patching is strongly recommended.