Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46303: n/a

0
Unknown
VulnerabilityCVE-2023-46303cvecve-2023-46303
Published: Sun Oct 22 2023 (10/22/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root.

AI-Powered Analysis

AILast updated: 11/04/2025, 16:52:05 UTC

Technical Analysis

CVE-2023-46303 is a security vulnerability identified in the calibre ebook management software, specifically in versions prior to 6.19.0. The vulnerability is located in the link_to_local_path function within the ebooks/conversion/plugins/html_input.py module. This function, by default, can add resources outside the document root during ebook conversion processes. This behavior can lead to a directory traversal-like condition where an attacker could craft ebook content that causes calibre to access or include files outside the intended directory scope. Such unauthorized file access could expose sensitive information or allow manipulation of files on the host system. The vulnerability does not have a CVSS score assigned yet, and no public exploits have been reported. Exploitation likely requires processing a malicious ebook file, which implies some level of user interaction or trust in the ebook source. The vulnerability affects all versions before 6.19.0, and the recommended fix is to upgrade to calibre 6.19.0 or later where the issue has been addressed. The lack of authentication requirements and the potential to access files outside the document root make this a notable risk, especially in environments where calibre is used to process untrusted or user-submitted ebook content.

Potential Impact

For European organizations, the impact of CVE-2023-46303 could be significant in sectors relying heavily on ebook management and conversion, such as publishing houses, educational institutions, and public libraries. Unauthorized access to files outside the document root could lead to exposure of sensitive data, including intellectual property, personal data, or internal documents. This could result in confidentiality breaches and potential compliance violations under regulations like GDPR. Additionally, manipulation of files could affect data integrity or disrupt ebook processing workflows, impacting availability of services. While no active exploitation is known, the ease of embedding malicious content in ebooks and the widespread use of calibre in Europe increase the risk. Organizations that allow users to upload or convert ebooks without strict validation are particularly vulnerable. The impact is mitigated somewhat by the need for user interaction and the absence of remote code execution, but the potential for data leakage remains a concern.

Mitigation Recommendations

To mitigate CVE-2023-46303, European organizations should immediately upgrade all calibre installations to version 6.19.0 or later, where the vulnerability is fixed. Additionally, implement strict file system permissions to restrict calibre's access to only necessary directories, minimizing the risk of unauthorized file access. Organizations should also enforce validation and sanitization of all ebook content before processing, especially if sourced from untrusted users or third parties. Employ sandboxing techniques or run calibre conversion processes in isolated environments to contain potential exploitation. Regularly monitor logs for unusual file access patterns during ebook conversions. Educate users about the risks of processing untrusted ebook files and establish policies to limit such activities. Finally, maintain up-to-date backups of critical data to recover from any potential data integrity issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-10-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a2dddf0ba78a050535afd

Added to database: 11/4/2025, 4:46:22 PM

Last enriched: 11/4/2025, 4:52:05 PM

Last updated: 11/6/2025, 12:43:32 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats