CVE-2026-33206
Received Received - Intake
Path Traversal and SSRF in Calibre E-book Manager Allows Data Exfiltration

Publication date: 2026-03-27

Last updated on: 2026-03-30

Assigner: GitHub, Inc.

Description
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-03-30
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
calibre-ebook calibre to 9.6.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33206 is a high-severity path traversal vulnerability in Calibre versions up to 9.5. It occurs during the conversion of text-based files like Markdown into ebooks, where Calibre processes image references. The software attempts to check if image paths start with the expected base directory but fails to properly normalize or sanitize these paths. This allows attackers to use relative path traversal sequences (such as "../../../../../../etc/passwd") to include arbitrary files from the file system into the converted ebook.

The vulnerable function, fix_resources, joins image sources with the base directory and verifies the path using a startswith check without accounting for path normalization, enabling unauthorized file inclusion. Additionally, when combined with another vulnerability in the background-image endpoint, attackers can exfiltrate these files without further user interaction.


How can this vulnerability impact me? :

This vulnerability allows an attacker to read arbitrary files from the file system during ebook conversion, which can lead to unauthorized disclosure of sensitive information. Since the attacker can include files like system password files or other confidential data into the ebook output, this poses a significant confidentiality risk.

Moreover, combined with the related background-image endpoint vulnerability, these files can be exfiltrated without additional user interaction, increasing the risk of data leakage. The vulnerability does not affect integrity or availability but has a high impact on confidentiality.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing if Calibre versions prior to 9.6.0 improperly include arbitrary files during the conversion of Markdown or similar text-based files into ebooks. A proof of concept involves running a specially crafted Markdown file that references files outside the intended directory using relative path traversal sequences (e.g., "../../../../../../etc/passwd").

To detect exploitation attempts or verify vulnerability, you can monitor file conversion activities in Calibre for unexpected file inclusions or check logs for attempts to convert files containing path traversal sequences.

Specific commands are not provided in the resources, but a practical approach includes:

  • Create a Markdown file with image references using relative path traversal sequences.
  • Run Calibre to convert this Markdown file to an ebook and inspect the output for inclusion of files outside the expected directory.
  • Monitor network traffic or file system access logs for unusual file reads during conversion.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Calibre to version 9.6.0 or later, where this path traversal vulnerability has been fixed.

Until the upgrade is applied, avoid converting untrusted Markdown or similar text-based files that may contain malicious path traversal sequences.

Additionally, restrict access to the Calibre conversion functionality to trusted users only, as the attack vector is local.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthorized reading and exfiltration of arbitrary files from the file system, which poses a significant confidentiality risk.

Such unauthorized access to sensitive files could lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls over the confidentiality and integrity of personal and sensitive data.

Therefore, exploitation of this vulnerability could result in non-compliance with these standards due to potential data breaches and unauthorized disclosure of protected information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart