The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions 6.5 through 7.17.0 allow arbitrary file writes to locations outside the intended output directory when processing notebooks containing crafted cell attachment filenames. The `ExtractAttachmentsPreprocessor` passes attachment filenames directly to the filesystem without sanitization, enabling path traversal attacks. This vulnerability provides complete control over both the destination path and file extension. Version 7.17.1 contains a patch.
Use CWE-22, Jupyter vendor hub and Nbconvert product page to widen CVE-2026-39377 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-53000, CVE-2021-32862 and CVE-2026-39378 for nearby disclosures in the same product family.