Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Calibre-ebook
Calibre-ebook calibre |
|
| CPEs | cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Calibre-ebook
Calibre-ebook calibre |
|
| Metrics |
cvssV3_1
|
Fri, 20 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kovidgoyal
Kovidgoyal calibre |
|
| Vendors & Products |
Kovidgoyal
Kovidgoyal calibre |
Fri, 20 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Function extract_pictures only checks startswith('Pictures'), and does not sanitize '..' sequences. calibre's own ZipFile.extractall() in utils/zipfile.py does sanitize '..' via _get_targetpath(), but extract_pictures() bypasses this by using manual zf.read() + open(). This issue has been fixed in version 9.3.0. | |
| Title | calibre: Path Traversal Vulnerability Enables Arbitrary File Write and Remote Code Execution | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T15:34:24.625Z
Reserved: 2026-02-10T18:01:31.900Z
Link: CVE-2026-26064
Updated: 2026-02-20T15:29:12.668Z
Status : Analyzed
Published: 2026-02-20T02:16:52.703
Modified: 2026-02-20T16:53:32.203
Link: CVE-2026-26064
No data.
OpenCVE Enrichment
Updated: 2026-02-20T09:52:55Z