calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in 9.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/kovidgoyal/calibre/commit/9739232fcb029ac15dfe52ccd4fdb4a07ebb6ce9 | Patch |
| https://github.com/kovidgoyal/calibre/security/advisories/GHSA-32vh-whvh-9fxr | Exploit Third Party Advisory |
| https://0x5t.raptx.org/posts/calibre-chm-rce | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-06 21:16
Updated : 2026-02-17 21:27
NVD link : CVE-2026-25635
Mitre link : CVE-2026-25635
CVE.ORG link : CVE-2026-25635
JSON object : View
Products Affected
calibre-ebook
- calibre
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
