Vulnerability Description
In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Janeczku | Calibre-Web | >= 0.6.0, < 0.6.12 |
Related Weaknesses (CWE)
References
- https://github.com/janeczku/calibre-web/commit/32e27712f0f71fdec646add20cd78b4cePatchThird Party Advisory
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964Third Party Advisory
- https://github.com/janeczku/calibre-web/commit/32e27712f0f71fdec646add20cd78b4cePatchThird Party Advisory
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964Third Party Advisory
FAQ
What is CVE-2021-25964?
CVE-2021-25964 is a vulnerability with a CVSS score of 5.4 (MEDIUM). In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the descript...
How severe is CVE-2021-25964?
CVE-2021-25964 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-25964?
Check the references section above for vendor advisories and patch information. Affected products include: Janeczku Calibre-Web.