Search for packages
| purl | pkg:deb/debian/calibre@5.12.0%2Bdfsg-1%2Bdeb11u2 |
| Next non-vulnerable version | 8.16.2+ds+~0.10.5-3~bpo13+1 |
| Latest non-vulnerable version | 8.16.2+ds+~0.10.5-3~bpo13+1 |
| Risk | 4.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2w1b-b6qm-4qhf
Aliases: CVE-2026-33205 |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a Server-Side Request Forgery vulnerability in the background-image endpoint of calibre e-book reader's web view allows an attacker to perform blind GET requests to arbitrary URLs and exfiltrate information out from the ebook sandbox. Version 9.6.0 patches the issue. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-4gvv-bsf9-vqca
Aliases: CVE-2023-46303 |
Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. |
Affected by 10 other vulnerabilities. |
|
VCID-b3vv-xdp2-7ub8
Aliases: CVE-2025-64486 |
calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0. |
Affected by 10 other vulnerabilities. |
|
VCID-bjj5-ynf7-v7aa
Aliases: CVE-2026-26065 |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0. |
Affected by 0 other vulnerabilities. |
|
VCID-dywq-dzuv-wka2
Aliases: CVE-2026-33206 |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-favj-1bjh-9uff
Aliases: CVE-2021-44686 |
calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py. |
Affected by 10 other vulnerabilities. |
|
VCID-hgmk-8s7s-tfdb
Aliases: CVE-2026-27810 |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue. |
Affected by 0 other vulnerabilities. |
|
VCID-jwpx-aqjh-dqej
Aliases: CVE-2026-25635 |
calibre: Calibre: Remote Code Execution via path traversal in CHM reader |
Affected by 0 other vulnerabilities. |
|
VCID-mqmp-g7uy-gbg4
Aliases: CVE-2026-30853 |
calibre: Calibre: Arbitrary file write via crafted RocketBook (.rb) file |
Affected by 0 other vulnerabilities. |
|
VCID-nj3z-4ya4-bqf7
Aliases: CVE-2026-27824 |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue. |
Affected by 0 other vulnerabilities. |
|
VCID-vq4p-dvg4-eudz
Aliases: CVE-2026-25636 |
calibre: Calibre: Arbitrary file corruption via path traversal in EPUB conversion |
Affected by 0 other vulnerabilities. |
|
VCID-x63d-4kux-cqcu
Aliases: CVE-2026-26064 |
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Function extract_pictures only checks startswith('Pictures'), and does not sanitize '..' sequences. calibre's own ZipFile.extractall() in utils/zipfile.py does sanitize '..' via _get_targetpath(), but extract_pictures() bypasses this by using manual zf.read() + open(). This issue has been fixed in version 9.3.0. |
Affected by 0 other vulnerabilities. |
|
VCID-zhz3-1799-a7hk
Aliases: CVE-2026-25731 |
calibre: Calibre: Arbitrary Code Execution via malicious custom template file during ebook conversion |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-pa4n-csyj-wqet | Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. |
CVE-2024-7009
|
| VCID-ycp8-ws8x-3qbn | Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. |
CVE-2024-7008
|