CVE-2025-62614: CWE-862: Missing Authorization in booklore-app booklore
BookLore is a self-hosted web app for organizing and managing personal book collections. In versions 1.8.1 and prior, an authentication bypass vulnerability in the BookMediaController allows any unauthenticated user to access and download book covers, thumbnails, and complete PDF/CBX page content without authorization. The vulnerability exists because multiple media endpoints lack proper access control annotations, and the CoverJwtFilter continues request processing even when no authentication token is provided. This enables attackers to enumerate and exfiltrate all book content from the system, bypassing the intended download permissions (canDownload) entirely. This issue has been patched via commit b226c43.
AI Analysis
Technical Summary
CVE-2025-62614 is an authentication bypass vulnerability identified in the BookLore web application, specifically affecting versions 1.8.1 and earlier. BookLore is a self-hosted platform designed for organizing and managing personal book collections. The vulnerability resides in the BookMediaController, where multiple media-serving endpoints lack proper access control annotations, violating CWE-862 (Missing Authorization). The CoverJwtFilter, responsible for validating JWT tokens for access control, erroneously allows requests to proceed even when no authentication token is presented. This flaw enables unauthenticated users to enumerate and download all media content stored within the application, including book covers, thumbnails, and complete page content in PDF or CBX formats. The intended permission check, canDownload, is completely bypassed, allowing full exfiltration of book content without any user credentials or interaction. The vulnerability is remotely exploitable over the network without any privileges or user interaction, making it highly accessible to attackers. The issue was addressed and patched in a subsequent commit (b226c43), which presumably added proper authorization checks and enforced token validation to prevent unauthorized access. Despite the lack of known exploits in the wild, the vulnerability poses a significant risk to confidentiality, as sensitive or copyrighted book collections could be exposed. The CVSS 4.0 base score of 8.7 reflects the critical nature of this flaw, emphasizing its network attack vector, low attack complexity, and no required privileges or user interaction. Organizations running vulnerable versions should prioritize patching to prevent data leakage and potential intellectual property theft.
Potential Impact
For European organizations, the impact of CVE-2025-62614 can be substantial, particularly for libraries, educational institutions, publishers, and private collectors using BookLore to manage digital book collections. Unauthorized access to book content could lead to intellectual property theft, violation of copyright laws, and loss of competitive advantage for publishers or authors. Confidentiality breaches may also expose sensitive metadata or annotations associated with the collections. The ability to download entire books without authorization undermines trust in the platform and could result in reputational damage. Additionally, organizations may face legal and regulatory consequences under the EU's GDPR if personal data related to users or book owners is inadvertently exposed. The vulnerability's ease of exploitation and lack of authentication requirements increase the likelihood of automated scanning and mass data exfiltration attempts. This could also facilitate further attacks, such as phishing or social engineering, by leveraging stolen content. Overall, the threat compromises the confidentiality and integrity of digital book collections, posing a high risk to affected European entities.
Mitigation Recommendations
European organizations using BookLore should immediately upgrade to the latest patched version beyond 1.8.1 that includes the fix for CVE-2025-62614. Until patching is possible, administrators should restrict network access to the BookLore instance, limiting it to trusted internal users via firewall rules or VPNs. Implementing additional web application firewalls (WAF) with custom rules to detect and block unauthorized media access requests can provide temporary protection. Review and enforce strict access control policies on media endpoints, ensuring that all requests require valid authentication tokens and proper authorization checks. Conduct thorough audits of existing permissions and logs to identify any potential unauthorized access or data exfiltration attempts. Educate users and administrators about the risks of running outdated software versions and the importance of timely updates. Finally, consider deploying monitoring solutions to detect anomalous download patterns indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-62614: CWE-862: Missing Authorization in booklore-app booklore
Description
BookLore is a self-hosted web app for organizing and managing personal book collections. In versions 1.8.1 and prior, an authentication bypass vulnerability in the BookMediaController allows any unauthenticated user to access and download book covers, thumbnails, and complete PDF/CBX page content without authorization. The vulnerability exists because multiple media endpoints lack proper access control annotations, and the CoverJwtFilter continues request processing even when no authentication token is provided. This enables attackers to enumerate and exfiltrate all book content from the system, bypassing the intended download permissions (canDownload) entirely. This issue has been patched via commit b226c43.
AI-Powered Analysis
Technical Analysis
CVE-2025-62614 is an authentication bypass vulnerability identified in the BookLore web application, specifically affecting versions 1.8.1 and earlier. BookLore is a self-hosted platform designed for organizing and managing personal book collections. The vulnerability resides in the BookMediaController, where multiple media-serving endpoints lack proper access control annotations, violating CWE-862 (Missing Authorization). The CoverJwtFilter, responsible for validating JWT tokens for access control, erroneously allows requests to proceed even when no authentication token is presented. This flaw enables unauthenticated users to enumerate and download all media content stored within the application, including book covers, thumbnails, and complete page content in PDF or CBX formats. The intended permission check, canDownload, is completely bypassed, allowing full exfiltration of book content without any user credentials or interaction. The vulnerability is remotely exploitable over the network without any privileges or user interaction, making it highly accessible to attackers. The issue was addressed and patched in a subsequent commit (b226c43), which presumably added proper authorization checks and enforced token validation to prevent unauthorized access. Despite the lack of known exploits in the wild, the vulnerability poses a significant risk to confidentiality, as sensitive or copyrighted book collections could be exposed. The CVSS 4.0 base score of 8.7 reflects the critical nature of this flaw, emphasizing its network attack vector, low attack complexity, and no required privileges or user interaction. Organizations running vulnerable versions should prioritize patching to prevent data leakage and potential intellectual property theft.
Potential Impact
For European organizations, the impact of CVE-2025-62614 can be substantial, particularly for libraries, educational institutions, publishers, and private collectors using BookLore to manage digital book collections. Unauthorized access to book content could lead to intellectual property theft, violation of copyright laws, and loss of competitive advantage for publishers or authors. Confidentiality breaches may also expose sensitive metadata or annotations associated with the collections. The ability to download entire books without authorization undermines trust in the platform and could result in reputational damage. Additionally, organizations may face legal and regulatory consequences under the EU's GDPR if personal data related to users or book owners is inadvertently exposed. The vulnerability's ease of exploitation and lack of authentication requirements increase the likelihood of automated scanning and mass data exfiltration attempts. This could also facilitate further attacks, such as phishing or social engineering, by leveraging stolen content. Overall, the threat compromises the confidentiality and integrity of digital book collections, posing a high risk to affected European entities.
Mitigation Recommendations
European organizations using BookLore should immediately upgrade to the latest patched version beyond 1.8.1 that includes the fix for CVE-2025-62614. Until patching is possible, administrators should restrict network access to the BookLore instance, limiting it to trusted internal users via firewall rules or VPNs. Implementing additional web application firewalls (WAF) with custom rules to detect and block unauthorized media access requests can provide temporary protection. Review and enforce strict access control policies on media endpoints, ensuring that all requests require valid authentication tokens and proper authorization checks. Conduct thorough audits of existing permissions and logs to identify any potential unauthorized access or data exfiltration attempts. Educate users and administrators about the risks of running outdated software versions and the importance of timely updates. Finally, consider deploying monitoring solutions to detect anomalous download patterns indicative of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-16T19:24:37.269Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f9488fb5ec6c3fed4b87a9
Added to database: 10/22/2025, 9:11:43 PM
Last enriched: 10/22/2025, 9:11:59 PM
Last updated: 10/22/2025, 11:49:18 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62710: CWE-337: Predictable Seed in Pseudo-Random Number Generator (PRNG) in sakaiproject sakai
LowPwn2Own Day 2: Hackers exploit 56 zero-days for $790,000
HighCVE-2025-62708: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in py-pdf pypdf
MediumCVE-2025-62707: CWE-834: Excessive Iteration in py-pdf pypdf
MediumCVE-2025-62613: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in steveseguin vdo.ninja
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.