PatchSiren cyber security CVE debrief
CVE-2026-40934 Jupyter CVE debrief
CVE-2026-40934 is a session-revocation weakness in Jupyter Server versions 2.17.0 and earlier. Because the secret used to sign authentication cookies is stored in a static runtime file and is not rotated when a user changes their password, previously issued cookies can remain valid after a password reset and server restart. The issue is fixed in Jupyter Server 2.18.0.
- Vendor
- Jupyter
- Product
- CVE-2026-40934
- CVSS
- HIGH 7.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-05
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-05
- Advisory updated
- 2026-05-11
Who should care
Administrators and operators of Jupyter Server deployments that use password-based authentication, especially shared, multi-user, or publicly reachable servers where password resets are expected to invalidate existing sessions.
Technical summary
According to the NVD record and the linked GitHub security advisory, Jupyter Server persisted the cookie-signing secret at ~/.local/share/jupyter/runtime/jupyter_cookie_secret and did not rotate it when a password changed. As a result, authentication cookies signed before the reset could continue to validate after restart. The vulnerability is mapped to CWE-613 (Insufficient Session Expiration) and affects Jupyter Server versions up to, but not including, 2.18.0.
Defensive priority
High. This is a high-severity authentication/session persistence issue (CVSS 7.6) that can preserve authenticated access after credential changes. Prioritize upgrades and session-invalidating operational checks.
Recommended defensive actions
- Upgrade Jupyter Server to version 2.18.0 or later.
- Treat password changes as insufficient for session revocation until the fixed version is deployed.
- Review whether any long-lived or shared authentication cookies may still be accepted after password resets.
- For exposed or multi-user deployments, validate that operational password rotation procedures include application upgrade and session reauthentication.
- Monitor the linked vendor advisory for any additional mitigation guidance.
Evidence notes
Source evidence comes from the official NVD record for CVE-2026-40934 and the linked GitHub security advisory. The NVD record lists Jupyter Server as affected through versions earlier than 2.18.0, includes the CWE-613 mapping, and references the vendor advisory for mitigation. The CVE published timestamp used here is 2026-05-05T22:16:00.820Z, with a later record modification on 2026-05-11T13:00:39.473Z.
Official resources
-
CVE-2026-40934 CVE record
CVE.org
-
CVE-2026-40934 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Vendor Advisory, Mitigation
Publicly disclosed on 2026-05-05 and updated in the official record on 2026-05-11. The fixed release is 2.18.0.