Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62614: CWE-862: Missing Authorization in booklore-app booklore

0
High
VulnerabilityCVE-2025-62614cvecve-2025-62614cwe-862
Published: Wed Oct 22 2025 (10/22/2025, 20:58:45 UTC)
Source: CVE Database V5
Vendor/Project: booklore-app
Product: booklore

Description

BookLore is a self-hosted web app for organizing and managing personal book collections. In versions 1.8.1 and prior, an authentication bypass vulnerability in the BookMediaController allows any unauthenticated user to access and download book covers, thumbnails, and complete PDF/CBX page content without authorization. The vulnerability exists because multiple media endpoints lack proper access control annotations, and the CoverJwtFilter continues request processing even when no authentication token is provided. This enables attackers to enumerate and exfiltrate all book content from the system, bypassing the intended download permissions (canDownload) entirely. This issue has been patched via commit b226c43.

AI-Powered Analysis

AILast updated: 10/29/2025, 21:48:05 UTC

Technical Analysis

CVE-2025-62614 is an authentication bypass vulnerability categorized under CWE-862 (Missing Authorization) found in the BookLore web application, specifically affecting versions 1.8.1 and earlier. BookLore is a self-hosted platform designed for managing personal book collections. The vulnerability exists in the BookMediaController component, where multiple media-serving endpoints do not enforce proper access control annotations. Additionally, the CoverJwtFilter, which is intended to validate JWT tokens for authorization, improperly allows requests to proceed even when no authentication token is presented. This combination results in unauthenticated users being able to access and download all media content, including book covers, thumbnails, and complete PDF or CBX page content. The exploit requires no authentication, no user interaction, and can be performed remotely over the network. Attackers can enumerate all stored book content and exfiltrate it, completely bypassing the intended 'canDownload' permission checks. The vulnerability was publicly disclosed on October 22, 2025, with a CVSS v4.0 score of 8.7 (high severity), reflecting its ease of exploitation and significant confidentiality impact. The issue has been addressed in a patch (commit b226c43), which adds proper access control annotations and fixes the CoverJwtFilter logic to reject unauthenticated requests. No known exploits are currently reported in the wild.

Potential Impact

For European organizations using BookLore to manage digital book collections, this vulnerability poses a serious risk of unauthorized data disclosure. Sensitive or proprietary book content stored in these systems can be fully enumerated and downloaded by any unauthenticated attacker, leading to intellectual property theft, privacy violations, and potential regulatory non-compliance under GDPR and other data protection laws. The breach of confidentiality could damage organizational reputation and result in legal penalties. Since BookLore is self-hosted, organizations with less mature IT security practices may be more vulnerable. The availability and integrity of the system are not directly impacted, but the loss of confidentiality alone is significant. The ease of exploitation and lack of required authentication make this a high-risk threat, especially for institutions such as libraries, educational entities, and publishers that may rely on BookLore for digital asset management.

Mitigation Recommendations

Organizations should immediately upgrade BookLore installations to versions later than 1.8.1 where the vulnerability is patched. If upgrading is not immediately feasible, administrators must implement strict network-level access controls to restrict access to the BookMediaController endpoints, such as IP whitelisting or VPN-only access. Review and enforce proper authorization annotations on all media-serving endpoints within the application. Audit the CoverJwtFilter or equivalent authentication middleware to ensure it correctly blocks unauthenticated requests. Conduct thorough access control testing and penetration testing focused on media content endpoints. Additionally, monitor logs for unusual access patterns indicative of enumeration attempts. Educate users and administrators about the risk and ensure backups of book content are securely stored. Finally, consider deploying Web Application Firewalls (WAFs) with rules to detect and block unauthorized media access attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.269Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f9488fb5ec6c3fed4b87a9

Added to database: 10/22/2025, 9:11:43 PM

Last enriched: 10/29/2025, 9:48:05 PM

Last updated: 12/6/2025, 12:35:30 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats