Vulnerability Description
Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the POST /api/backups/upload endpoint decompresses the details entry from an uploaded .audiobookshelf ZIP file entirely into memory using zip.entryData(), with no limit on the decompressed size. The upload middleware also has no file size limit. An admin user can upload a crafted ZIP containing a highly compressed details entry that, when decompressed, consumes hundreds of megabytes or gigabytes of memory, crashing the server process via out-of-memory. This vulnerability is fixed in 2.32.2.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-4jq4-rvq8-j26
- https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-4jq4-rvq8-j26
FAQ
What is CVE-2026-42886?
CVE-2026-42886 is a vulnerability with a CVSS score of 4.9 (MEDIUM). Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the POST /api/backups/upload endpoint decompresses the details entry from an uploaded .audiobookshelf ZIP file entirely i...
How severe is CVE-2026-42886?
CVE-2026-42886 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42886?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.