← Back to CVEs
CVE-2026-25636
HIGH8.2
Description
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0.
CVE Details
CVSS v3.1 Score8.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published2/6/2026
Last Modified2/17/2026
Sourcenvd
Honeypot Sightings0
Affected Products
calibre-ebook:calibre
Weaknesses (CWE)
CWE-22CWE-73CWE-94CWE-22
References
https://github.com/kovidgoyal/calibre/commit/9484ea82c6ab226c18e6ca5aa000fa16de598726(security-advisories@github.com)
https://github.com/kovidgoyal/calibre/security/advisories/GHSA-8r26-m7j5-hm29(security-advisories@github.com)
https://0x5t.raptx.org/posts/calibre-epub-rce(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.