calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/kovidgoyal/calibre/commit/9484ea82c6ab226c18e6ca5aa000fa16de598726 | Patch |
| https://github.com/kovidgoyal/calibre/security/advisories/GHSA-8r26-m7j5-hm29 | Exploit Third Party Advisory |
| https://0x5t.raptx.org/posts/calibre-epub-rce | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-06 21:16
Updated : 2026-02-17 21:23
NVD link : CVE-2026-25636
Mitre link : CVE-2026-25636
CVE.ORG link : CVE-2026-25636
JSON object : View
Products Affected
calibre-ebook
- calibre
