CVE-2026-33175

JupyterHub · OAuthenticator

OAuthenticator, used with JupyterHub for OAuth2 identity provision, contains a high-severity vulnerability that could allow for unauthorized authentication or privilege escalation.

Executive summary

A high-severity vulnerability in the JupyterHub OAuthenticator component could allow unauthorized users to bypass authentication mechanisms and access sensitive data.

Vulnerability

This vulnerability affects OAuthenticator, the software that integrates OAuth2 identity providers with JupyterHub. Given the CVSS score of 8.8, the flaw likely permits an attacker to bypass authentication or incorrectly map identities, granting them unauthorized access to JupyterHub environments.

Business impact

JupyterHub environments often contain sensitive research data, proprietary code, and access to significant compute resources. A CVSS score of 8.8 indicates a High business impact, as an attacker could gain access to these assets, leading to intellectual property theft or the misuse of organizational infrastructure.

Remediation

Immediate Action: Update OAuthenticator to the latest version immediately to ensure all OAuth2 identity checks are performed correctly.

Proactive Monitoring: Review JupyterHub login logs for any unusual authentication patterns or users gaining access without proper authorization from the configured identity provider.

Compensating Controls: Implement additional layers of authentication, such as mandatory MFA at the identity provider level, and restrict JupyterHub access to known corporate IP ranges.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The 8.8 CVSS score signifies a critical risk to any organization relying on OAuthenticator for JupyterHub security. Administrators should prioritize this update to prevent unauthorized access to their data science and research environments. Immediate patching is strongly recommended.