Description

Dask distributed is a distributed task scheduler for Dask. Prior to 2026.1.0, when Jupyter Lab, jupyter-server-proxy, and Dask distributed are all run together, it is possible to craft a URL which will result in code being executed by Jupyter due to a cross-side-scripting (XSS) bug in the Dask dashboard. It is possible for attackers to craft a phishing URL that assumes Jupyter Lab and Dask may be running on localhost and using default ports. If a user clicks on the malicious link it will open an error page in the Dask Dashboard via the Jupyter Lab proxy which will cause code to be executed by the default Jupyter Python kernel. This vulnerability is fixed in 2026.1.0.

INFO

Published Date :

2026-01-16T16:44:28.152Z

Last Modified :

2026-01-16T17:21:36.324Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-23528 vulnerability.

Vendors Products
Dask
  • Distributed
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-23528.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability