Skip to main content

CVE-2025-55165: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gelbphoenix autocaliweb

High
VulnerabilityCVE-2025-55165cvecve-2025-55165cwe-200
Published: Tue Aug 12 2025 (08/12/2025, 20:52:41 UTC)
Source: CVE Database V5
Vendor/Project: gelbphoenix
Product: autocaliweb

Description

Autocaliweb is a web app that offers an interface for browsing, reading, and downloading eBooks using a valid Calibre database. Prior to version 0.8.3, the debug pack generated by Autocaliweb can expose sensitive configuration data, including API keys. This occurs because the to_dict() method, used to serialize configuration for the debug pack, doesn't adequately filter out sensitive fields such as API tokens. Users, unaware of the full contents, might share these debug packs, inadvertently leaking their private API keys. This issue has been patched in version 0.8.3.

AI-Powered Analysis

AILast updated: 08/20/2025, 02:08:15 UTC

Technical Analysis

CVE-2025-55165 is a high-severity vulnerability affecting versions of the gelbphoenix autocaliweb web application prior to 0.8.3. Autocaliweb is designed to provide an interface for browsing, reading, and downloading eBooks from a valid Calibre database. The vulnerability arises from the way the application generates debug packs, which are intended to assist in troubleshooting. Specifically, the to_dict() method used to serialize the application's configuration data for these debug packs does not properly filter out sensitive information such as API keys and tokens. As a result, when users generate and share debug packs, they may inadvertently expose sensitive configuration details to unauthorized actors. This exposure can lead to significant confidentiality breaches, as API keys often grant access to backend services or third-party integrations. The vulnerability requires local access with low privileges and some user interaction (sharing the debug pack), but due to the sensitive nature of the leaked data, the impact on confidentiality, integrity, and availability is high. The vulnerability has been addressed in version 0.8.3 of autocaliweb, which properly sanitizes sensitive fields before including them in debug packs. No known exploits are currently reported in the wild, but the high CVSS score of 8.3 reflects the potential severity if exploited.

Potential Impact

For European organizations using autocaliweb versions prior to 0.8.3, this vulnerability poses a significant risk of sensitive information leakage. Exposure of API keys can lead to unauthorized access to backend systems, data exfiltration, or manipulation of services integrated via those keys. This can compromise the confidentiality and integrity of organizational data and potentially disrupt availability if attackers leverage the keys to perform malicious actions. Organizations relying on autocaliweb for eBook management or distribution may face operational disruptions and reputational damage if sensitive data is leaked. Additionally, given the interconnected nature of IT environments, leaked API keys could be used as pivot points for broader network intrusions. The fact that the vulnerability requires some user interaction (sharing debug packs) means that insider awareness and training are critical to prevent accidental exposure. The absence of known exploits in the wild suggests that proactive patching and mitigation can effectively reduce risk before exploitation occurs.

Mitigation Recommendations

1. Immediate upgrade to autocaliweb version 0.8.3 or later, which includes the patch that properly sanitizes debug pack contents. 2. Audit existing debug packs that may have been generated and shared to identify any potential exposure of API keys or other sensitive data. 3. Rotate all API keys and tokens that were included in debug packs generated by vulnerable versions to invalidate potentially compromised credentials. 4. Implement strict access controls and monitoring around the generation and sharing of debug packs to ensure only authorized personnel can create and distribute them. 5. Educate users about the risks of sharing debug packs and establish clear policies for handling diagnostic data containing sensitive information. 6. Consider implementing automated scanning tools to detect sensitive data exposure in debug or log files before they are shared externally. 7. Monitor network and application logs for unusual activity that could indicate misuse of leaked API keys.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-07T18:27:23.307Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689bac14ad5a09ad0036c6c9

Added to database: 8/12/2025, 9:03:16 PM

Last enriched: 8/20/2025, 2:08:15 AM

Last updated: 10/2/2025, 12:39:35 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats