Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62614: CWE-862: Missing Authorization in booklore-app booklore

0
High
VulnerabilityCVE-2025-62614cvecve-2025-62614cwe-862
Published: Wed Oct 22 2025 (10/22/2025, 20:58:45 UTC)
Source: CVE Database V5
Vendor/Project: booklore-app
Product: booklore

Description

BookLore is a self-hosted web app for organizing and managing personal book collections. In versions 1.8.1 and prior, an authentication bypass vulnerability in the BookMediaController allows any unauthenticated user to access and download book covers, thumbnails, and complete PDF/CBX page content without authorization. The vulnerability exists because multiple media endpoints lack proper access control annotations, and the CoverJwtFilter continues request processing even when no authentication token is provided. This enables attackers to enumerate and exfiltrate all book content from the system, bypassing the intended download permissions (canDownload) entirely. This issue has been patched via commit b226c43.

AI-Powered Analysis

AILast updated: 10/22/2025, 21:11:59 UTC

Technical Analysis

CVE-2025-62614 is an authentication bypass vulnerability identified in the BookLore web application, specifically affecting versions 1.8.1 and earlier. BookLore is a self-hosted platform designed for organizing and managing personal book collections. The vulnerability resides in the BookMediaController, where multiple media-serving endpoints lack proper access control annotations, violating CWE-862 (Missing Authorization). The CoverJwtFilter, responsible for validating JWT tokens for access control, erroneously allows requests to proceed even when no authentication token is presented. This flaw enables unauthenticated users to enumerate and download all media content stored within the application, including book covers, thumbnails, and complete page content in PDF or CBX formats. The intended permission check, canDownload, is completely bypassed, allowing full exfiltration of book content without any user credentials or interaction. The vulnerability is remotely exploitable over the network without any privileges or user interaction, making it highly accessible to attackers. The issue was addressed and patched in a subsequent commit (b226c43), which presumably added proper authorization checks and enforced token validation to prevent unauthorized access. Despite the lack of known exploits in the wild, the vulnerability poses a significant risk to confidentiality, as sensitive or copyrighted book collections could be exposed. The CVSS 4.0 base score of 8.7 reflects the critical nature of this flaw, emphasizing its network attack vector, low attack complexity, and no required privileges or user interaction. Organizations running vulnerable versions should prioritize patching to prevent data leakage and potential intellectual property theft.

Potential Impact

For European organizations, the impact of CVE-2025-62614 can be substantial, particularly for libraries, educational institutions, publishers, and private collectors using BookLore to manage digital book collections. Unauthorized access to book content could lead to intellectual property theft, violation of copyright laws, and loss of competitive advantage for publishers or authors. Confidentiality breaches may also expose sensitive metadata or annotations associated with the collections. The ability to download entire books without authorization undermines trust in the platform and could result in reputational damage. Additionally, organizations may face legal and regulatory consequences under the EU's GDPR if personal data related to users or book owners is inadvertently exposed. The vulnerability's ease of exploitation and lack of authentication requirements increase the likelihood of automated scanning and mass data exfiltration attempts. This could also facilitate further attacks, such as phishing or social engineering, by leveraging stolen content. Overall, the threat compromises the confidentiality and integrity of digital book collections, posing a high risk to affected European entities.

Mitigation Recommendations

European organizations using BookLore should immediately upgrade to the latest patched version beyond 1.8.1 that includes the fix for CVE-2025-62614. Until patching is possible, administrators should restrict network access to the BookLore instance, limiting it to trusted internal users via firewall rules or VPNs. Implementing additional web application firewalls (WAF) with custom rules to detect and block unauthorized media access requests can provide temporary protection. Review and enforce strict access control policies on media endpoints, ensuring that all requests require valid authentication tokens and proper authorization checks. Conduct thorough audits of existing permissions and logs to identify any potential unauthorized access or data exfiltration attempts. Educate users and administrators about the risks of running outdated software versions and the importance of timely updates. Finally, consider deploying monitoring solutions to detect anomalous download patterns indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.269Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f9488fb5ec6c3fed4b87a9

Added to database: 10/22/2025, 9:11:43 PM

Last enriched: 10/22/2025, 9:11:59 PM

Last updated: 10/22/2025, 11:49:18 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats