Description
Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the POST /api/backups/upload endpoint decompresses the details entry from an uploaded .audiobookshelf ZIP file entirely into memory using zip.entryData(), with no limit on the decompressed size. The upload middleware also has no file size limit. An admin user can upload a crafted ZIP containing a highly compressed details entry that, when decompressed, consumes hundreds of megabytes or gigabytes of memory, crashing the server process via out-of-memory. This vulnerability is fixed in 2.32.2.
Published: 2026-05-11
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Audiobookshelf versions prior to 2.32.2 allow an administrator to upload an .audiobookshelf ZIP file that is decompressed entirely into memory with no size limits. A crafted backup containing a highly compressed details entry can inflate to hundreds of megabytes or more when decompressed, causing the server process to run out of memory and crash. This vulnerability is classified as a memory amplification denial‑of‑service flaw (CWE‑409).

Affected Systems

The affected product is advplyr’s Audiobookshelf. All releases earlier than 2.32.2 are vulnerable, including 2.32.1 and earlier. The susceptibility exists on any deployment that exposes the POST /api/backups/upload endpoint to authenticated administrators.

Risk and Exploitability

The CVSS score of 4.9 indicates moderate severity. Because no EPSS score is available and the vulnerability is not listed in CISA’s KEV catalog, exploitation is not widely reported, but the attack logic is straightforward: an authenticated administrator uploads a malicious ZIP. If the server’s environment allows unchecked memory allocation, a successful upload will exhaust RAM and terminate the process, causing a denial of service. The primary attack vector is an authenticated upload operation; no public network exposure is required beyond normal administrative access.

Generated by OpenCVE AI on May 11, 2026 at 23:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Audiobookshelf to version 2.32.2 or later to apply the vendor patch that limits decompression size.
  • Configure the HTTP reverse proxy or web server to reject file uploads larger than a defined safe threshold (for example, 10 MB) to prevent oversized backup files from reaching the application layer.
  • Ensure that only trusted, authenticated administrators have access to the POST /api/backups/upload endpoint, and consider disabling backup upload functionality if it is not required for the deployment.

Generated by OpenCVE AI on May 11, 2026 at 23:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Advplyr
Advplyr audiobookshelf
Vendors & Products Advplyr
Advplyr audiobookshelf

Mon, 11 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the POST /api/backups/upload endpoint decompresses the details entry from an uploaded .audiobookshelf ZIP file entirely into memory using zip.entryData(), with no limit on the decompressed size. The upload middleware also has no file size limit. An admin user can upload a crafted ZIP containing a highly compressed details entry that, when decompressed, consumes hundreds of megabytes or gigabytes of memory, crashing the server process via out-of-memory. This vulnerability is fixed in 2.32.2.
Title Audiobookshelf: Memory amplification DoS via oversized compressed details entry in backup upload
Weaknesses CWE-409
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Advplyr Audiobookshelf
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T12:57:50.120Z

Reserved: 2026-04-30T18:49:06.712Z

Link: CVE-2026-42886

cve-icon Vulnrichment

Updated: 2026-05-12T12:57:42.653Z

cve-icon NVD

Status : Deferred

Published: 2026-05-11T20:25:45.020

Modified: 2026-05-12T14:50:18.527

Link: CVE-2026-42886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T23:15:09Z

Weaknesses