Description
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix.
Published: 2026-03-27
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

Calibre’s image handling in Markdown and similar text files contains a path‑traversal flaw that lets an attacker specify an arbitrary local file to be copied into the converted book. The application therefore can read and package files from any location the attacker can reference. Additionally, the background‑image endpoint of the ebook reader web view lacks authentication and is vulnerable to server‑side request forgery, enabling the same local files to be exfiltrated without extra interaction. The weakness corresponds to CWE‑23 and results in the disclosure of potentially sensitive data on the host system.

Affected Systems

All builds of Calibre produced by Kovid Goyal with a version lower than 9.6.0 are susceptible. The software is cross‑platform, operating on Windows, macOS and Linux, and is used for viewing, converting, editing, and cataloging e‑books. Any user who opens or converts a maliciously crafted Markdown or other text based file, or who allows the web view to access the background‑image endpoint on a vulnerable installation, is at risk.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.2, placing it in the High severity range, and an EPSS score of less than 1 %, indicating that automated exploitation is unlikely. It is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, it is inferred that the primary attack vector is local or requires the victim to open a specially crafted file; a remote attacker could also abuse the unauthenticated background‑image endpoint if they can trigger it from a web view on the target. The risk is therefore higher for environments where users routinely process untrusted e‑book files or where the background image endpoint is exposed.

Generated by OpenCVE AI on March 31, 2026 at 07:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Calibre to version 9.6.0 or later
  • Disable or secure the background‑image endpoint in the web view to require authentication
  • Avoid opening or converting untrusted Markdown or other text‑based e‑book files

Generated by OpenCVE AI on March 31, 2026 at 07:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
First Time appeared Calibre-ebook
Calibre-ebook calibre
CPEs cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
Vendors & Products Calibre-ebook
Calibre-ebook calibre
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Kovidgoyal
Kovidgoyal calibre
Vendors & Products Kovidgoyal
Kovidgoyal calibre

Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix.
Title calibre has a path traversal vulnerability
Weaknesses CWE-23
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Calibre-ebook Calibre
Kovidgoyal Calibre
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T14:48:44.155Z

Reserved: 2026-03-17T23:23:58.312Z

Link: CVE-2026-33206

cve-icon Vulnrichment

Updated: 2026-03-27T14:48:29.828Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T15:16:54.453

Modified: 2026-03-30T20:46:25.807

Link: CVE-2026-33206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:01:17Z

Weaknesses