Debian Calibre vulnerabilities
23 known vulnerabilities affecting debian/calibre.
Total CVEs
23
CISA KEV
0
Public exploits
3
Exploited in wild
0
Severity breakdown
CRITICAL8HIGH8MEDIUM5LOW2
Vulnerabilities
Page 1 of 2
CVE-2026-30853CRITICALCVSS 9.3fixed in calibre 9.5.0+ds+~0.10.5-1 (forky)2026
CVE-2026-30853 [CRITICAL] CVE-2026-30853: calibre - calibre is a cross-platform e-book manager for viewing, converting, editing, and...
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to 9.5.0, a path traversal vulnerability in the RocketBook (.rb) input plugin (src/calibre/ebooks/rb/reader.py) allows an attacker to write arbitrary files to any path writable by the calibre process when a user opens or converts a crafted .rb file. This is
debian
CVE-2026-26064CRITICALCVSS 9.3fixed in calibre 9.3.0+ds+~0.10.5-1 (forky)2026
CVE-2026-26064 [CRITICAL] CVE-2026-26064: calibre - calibre is a cross-platform e-book manager for viewing, converting, editing, and...
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Fu
debian
CVE-2026-26065CRITICALCVSS 9.3fixed in calibre 9.3.0+ds+~0.10.5-1 (forky)2026
CVE-2026-26065 [CRITICAL] CVE-2026-26065: calibre - calibre is a cross-platform e-book manager for viewing, converting, editing, and...
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written i
debian
CVE-2026-33206HIGHCVSS 8.2fixed in calibre 9.6.0+ds+~0.10.5-1 (forky)2026
CVE-2026-33206 [HIGH] CVE-2026-33206: calibre - calibre is a cross-platform e-book manager for viewing, converting, editing, and...
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authenticat
debian
CVE-2026-25636HIGHCVSS 8.2fixed in calibre 9.2.0+ds+~0.10.5-1 (forky)2026
CVE-2026-25636 [HIGH] CVE-2026-25636: calibre - calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerabili...
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when
debian
CVE-2026-25731HIGHCVSS 7.8fixed in calibre 9.2.0+ds+~0.10.5-1 (forky)2026
CVE-2026-25731 [HIGH] CVE-2026-25731: calibre - calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (...
calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability in Calibre's Templite templating engine allows arbitrary code execution when a user converts an ebook using a malicious custom template file via the --template-html or --template-html-index command-line options. This vulnerability is fixed in 9.2.0.
Scope: local
bookw
debian
CVE-2026-25635HIGHCVSS 8.6fixed in calibre 9.2.0+ds+~0.10.5-1 (forky)2026
CVE-2026-25635 [HIGH] CVE-2026-25635: calibre - calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a pa...
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in
debian
CVE-2026-33205MEDIUMCVSS 4.8fixed in calibre 9.6.0+ds+~0.10.5-1 (forky)2026
CVE-2026-33205 [MEDIUM] CVE-2026-33205: calibre - calibre is a cross-platform e-book manager for viewing, converting, editing, and...
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a Server-Side Request Forgery vulnerability in the background-image endpoint of calibre e-book reader's web view allows an attacker to perform blind GET requests to arbitrary URLs and exfiltrate information out from the ebook sandbox. Versio
debian
CVE-2026-27810MEDIUMCVSS 6.4fixed in calibre 9.4.0+ds+~0.10.5-1 (forky)2026
CVE-2026-27810 [MEDIUM] CVE-2026-27810: calibre - calibre is a cross-platform e-book manager for viewing, converting, editing, and...
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/
debian
CVE-2026-27824MEDIUMCVSS 5.3fixed in calibre 9.4.0+ds+~0.10.5-1 (forky)2026
CVE-2026-27824 [MEDIUM] CVE-2026-27824: calibre - calibre is a cross-platform e-book manager for viewing, converting, editing, and...
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation o
debian
CVE-2025-64486CRITICALCVSS 9.3fixed in calibre 6.13.0+repack-2+deb12u5 (bookworm)2025
CVE-2025-64486 [CRITICAL] CVE-2025-64486: calibre - calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not val...
calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0.
Scope:
debian
CVE-2024-6782CRITICALCVSS 9.8PoCfixed in calibre 6.13.0+repack-2+deb12u4 (bookworm)2024
CVE-2024-6782 [CRITICAL] CVE-2024-6782: calibre - Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attacker...
Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
Scope: local
bookworm: resolved (fixed in 6.13.0+repack-2+deb12u4)
bullseye: resolved
forky: resolved (fixed in 7.16.0+ds-1)
sid: resolved (fixed in 7.16.0+ds-1)
trixie: resolved (fixed in 7.16.0+ds-1)
debian
CVE-2024-7008MEDIUMCVSS 5.4PoCfixed in calibre 6.13.0+repack-2+deb12u4 (bookworm)2024
CVE-2024-7008 [MEDIUM] CVE-2024-7008: calibre - Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected...
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting.
Scope: local
bookworm: resolved (fixed in 6.13.0+repack-2+deb12u4)
bullseye: resolved (fixed in 5.12.0+dfsg-1+deb11u2)
forky: resolved (fixed in 7.16.0+ds-1)
sid: resolved (fixed in 7.16.0+ds-1)
trixie: resolved (fixed in 7.16.0+ds-1)
debian
CVE-2024-7009MEDIUMCVSS 4.2fixed in calibre 6.13.0+repack-2+deb12u4 (bookworm)2024
CVE-2024-7009 [MEDIUM] CVE-2024-7009: calibre - Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perf...
Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text searches to achieve SQL injection on the SQLite database.
Scope: local
bookworm: resolved (fixed in 6.13.0+repack-2+deb12u4)
bullseye: resolved (fixed in 5.12.0+dfsg-1+deb11u2)
forky: resolved (fixed in 7.16.0+ds-1)
sid: resolved (fixed in 7.16.0+ds-1)
trixie: resolved (fix
debian
CVE-2024-6781LOWCVSS 7.5PoCfixed in calibre 7.16.0+ds-1 (forky)2024
CVE-2024-6781 [HIGH] CVE-2024-6781: calibre - Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve a...
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved (fixed in 7.16.0+ds-1)
sid: resolved (fixed in 7.16.0+ds-1)
trixie: resolved (fixed in 7.16.0+ds-1)
debian
CVE-2023-46303HIGHCVSS 7.5fixed in calibre 6.13.0+repack-2+deb12u3 (bookworm)2023
CVE-2023-46303 [HIGH] CVE-2023-46303: calibre - link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before ...
link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root.
Scope: local
bookworm: resolved (fixed in 6.13.0+repack-2+deb12u3)
bullseye: resolved (fixed in 5.12.0+dfsg-1+deb11u3)
forky: resolved (fixed in 6.19.1-1)
sid: resolved (fixed in 6.19.1-1)
trixie: resolved (fixed in 6.19
debian
CVE-2021-44686HIGHCVSS 7.5fixed in calibre 5.33.0+dfsg-1 (bookworm)2021
CVE-2021-44686 [HIGH] CVE-2021-44686: calibre - calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS ...
calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py.
Scope: local
bookworm: resolved (fixed in 5.33.0+dfsg-1)
bullseye: resolved (fixed in 5.12.0+dfsg-1+deb11u3)
forky: resolved (fixed in 5.33.0+dfsg-1)
sid: resolved (fixed in 5.33.0+dfsg-1)
debian
CVE-2018-7889HIGHCVSS 7.8fixed in calibre 3.19.0+dfsg-1 (bookworm)2018
CVE-2018-7889 [HIGH] CVE-2018-7889: calibre - gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bo...
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
Scope: local
bookworm: resolved (fixed in 3.19.0+dfsg-1)
bullseye: resolved (fixed in 3.19.0+dfsg-1)
forky: resolved (fixed in 3.
debian
CVE-2016-10187LOWCVSS 5.5fixed in calibre 2.75.1+dfsg-1 (bookworm)2016
CVE-2016-10187 [MEDIUM] CVE-2016-10187: calibre - The E-book viewer in calibre before 2.75 allows remote attackers to read arbitra...
The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript.
Scope: local
bookworm: resolved (fixed in 2.75.1+dfsg-1)
bullseye: resolved (fixed in 2.75.1+dfsg-1)
forky: resolved (fixed in 2.75.1+dfsg-1)
sid: resolved (fixed in 2.75.1+dfsg-1)
trixie: resolved (fixed in 2.75.1+dfsg-1)
debian
CVE-2011-4125CRITICALCVSS 9.8fixed in calibre 1.5.0+dfsg-1 (bookworm)2011
CVE-2011-4125 [CRITICAL] CVE-2011-4125: calibre - A untrusted search path issue was found in Calibre at devices/linux_mount_helper...
A untrusted search path issue was found in Calibre at devices/linux_mount_helper.c leading to the ability of unprivileged users to execute any program as root.
Scope: local
bookworm: resolved (fixed in 1.5.0+dfsg-1)
bullseye: resolved (fixed in 1.5.0+dfsg-1)
forky: resolved (fixed in 1.5.0+dfsg-1)
sid: resolved (fixed in 1.5.0+dfsg-1)
trixie: resolved (fixed in 1.
debian
1 / 2Next →