Calibre-Ebook Calibre vulnerabilities

17 known vulnerabilities affecting calibre-ebook/calibre.

Total CVEs
17
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH10MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2026-33206HIGHCVSS 8.2fixed in 9.6.02026-03-27
CVE-2026-33206 [HIGH] CWE-23 CVE-2026-33206: calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missi
nvd
CVE-2026-33205MEDIUMCVSS 4.8fixed in 9.6.02026-03-27
CVE-2026-33205 [MEDIUM] CWE-918 CVE-2026-33205: calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a Server-Side Request Forgery vulnerability in the background-image endpoint of calibre e-book reader's web view allows an attacker to perform blind GET requests to arbitrary URLs and exfiltrate information out from the ebook
nvd
CVE-2026-30853HIGHCVSS 8.2fixed in 9.5.02026-03-13
CVE-2026-30853 [HIGH] CVE-2026-30853: calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to 9.5.0, a path traversal vulnerability in the RocketBook (.rb) input plugin (src/calibre/ebooks/rb/reader.py) allows an attacker to write arbitrary files to any path writable by the calibre process when a user opens or converts a crafted .rb file. This
nvdosv
CVE-2026-27824MEDIUMCVSS 5.3fixed in 9.4.02026-02-27
CVE-2026-27824 [MEDIUM] CWE-307 CVE-2026-27824: calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without a
nvd
CVE-2026-27810MEDIUMCVSS 6.4fixed in 9.4.02026-02-27
CVE-2026-27810 [MEDIUM] CWE-113 CVE-2026-27810: calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the
nvd
CVE-2026-26064CRITICALCVSS 9.3fixed in 9.3.02026-02-20
CVE-2026-26064 [CRITICAL] CWE-22 CVE-2026-26064: calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on
nvd
CVE-2026-26065CRITICALCVSS 9.3fixed in 9.3.02026-02-20
CVE-2026-26065 [CRITICAL] CWE-22 CVE-2026-26065: calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files
nvd
CVE-2026-25731HIGHCVSS 7.8fixed in 9.2.02026-02-06
CVE-2026-25731 [HIGH] CWE-1336 CVE-2026-25731: calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via the --template-html or --template-html-index command-line options. This vulnerability is fixed in 9.2.0.
nvd
CVE-2026-25636HIGHCVSS 7.8fixed in 9.2.02026-02-06
CVE-2026-25636 [HIGH] CWE-22 CVE-2026-25636: calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write m
nvd
CVE-2026-25635HIGHCVSS 8.6fixed in 9.2.02026-02-06
CVE-2026-25635 [HIGH] CWE-22 CVE-2026-25635: calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnera calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerabili
nvd
CVE-2024-6781HIGHCVSS 7.5PoC≤ 7.14.02024-08-06
CVE-2024-6781 [HIGH] CWE-22 CVE-2024-6781: Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read. Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
nvd
CVE-2024-7009HIGHCVSS 7.1≤ 7.15.02024-08-06
CVE-2024-7009 [HIGH] CWE-89 CVE-2024-7009: Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text search Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text searches to achieve SQL injection on the SQLite database.
nvd
CVE-2024-7008MEDIUMCVSS 6.1PoC≤ 7.15.02024-08-06
CVE-2024-7008 [MEDIUM] CWE-79 CVE-2024-7008: Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scriptin Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting.
nvd
CVE-2023-46303HIGHCVSS 7.5fixed in 6.19.02023-10-22
CVE-2023-46303 [HIGH] CWE-918 CVE-2023-46303: link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by defau link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root.
nvdosv
CVE-2021-44686HIGHCVSS 7.5fixed in 5.32.02021-12-07
CVE-2021-44686 [HIGH] CWE-400 CVE-2021-44686: calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py.
nvdosv
CVE-2018-7889HIGHCVSS 7.8v3.18.02018-03-08
CVE-2018-7889 [HIGH] CWE-502 CVE-2018-7889: gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which a gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
nvdosv
CVE-2016-10187MEDIUMCVSS 5.5≤ 2.74.02017-03-16
CVE-2016-10187 [MEDIUM] CWE-264 CVE-2016-10187: The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a craft The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript.
nvdosv