Vulnerability Description
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Calibre-Ebook | Calibre | < 9.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/kovidgoyal/calibre/security/advisories/GHSA-h3p4-m74f-43g6ExploitVendor Advisory
- https://github.com/kovidgoyal/calibre/security/advisories/GHSA-h3p4-m74f-43g6ExploitVendor Advisory
FAQ
What is CVE-2026-33206?
CVE-2026-33206 is a vulnerability with a CVSS score of 6.3 (MEDIUM). calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Mar...
How severe is CVE-2026-33206?
CVE-2026-33206 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33206?
Check the references section above for vendor advisories and patch information. Affected products include: Calibre-Ebook Calibre.