Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64486: CWE-73: External Control of File Name or Path in kovidgoyal calibre

0
Critical
VulnerabilityCVE-2025-64486cvecve-2025-64486cwe-73
Published: Fri Nov 07 2025 (11/07/2025, 23:25:55 UTC)
Source: CVE Database V5
Vendor/Project: kovidgoyal
Product: calibre

Description

calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0.

AI-Powered Analysis

AILast updated: 11/07/2025, 23:45:42 UTC

Technical Analysis

CVE-2025-64486 is a critical security vulnerability affecting the calibre e-book management software, specifically versions 8.13.0 and earlier. The flaw arises from calibre's failure to properly validate filenames when processing binary assets embedded within FB2 (FictionBook) files. An attacker can craft a malicious FB2 file containing specially crafted filenames that, when opened or converted by calibre, cause arbitrary files to be written to the victim's filesystem. This external control of file name or path (CWE-73) can be leveraged to execute arbitrary code with the privileges of the user running calibre. The vulnerability requires user interaction—opening or converting a malicious FB2 file—but does not require prior authentication or elevated privileges. The CVSS 4.0 score is 9.3 (critical), reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. The issue was addressed in calibre version 8.14.0 by implementing proper filename validation and sanitization. No known exploits have been reported in the wild yet, but the vulnerability poses a significant risk due to calibre's widespread use in managing e-books across personal and organizational environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to sectors relying heavily on digital publishing, libraries, educational institutions, and any environment where calibre is used to manage or convert e-books. Successful exploitation could lead to arbitrary code execution, enabling attackers to install malware, exfiltrate sensitive data, or disrupt operations by corrupting or deleting files. Given calibre often runs on user endpoints, exploitation could serve as an entry point for broader network compromise. The impact on confidentiality, integrity, and availability is high, potentially affecting intellectual property, user privacy, and operational continuity. Organizations with large user bases or those distributing FB2 files are at heightened risk. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent patching and monitoring.

Mitigation Recommendations

European organizations should immediately upgrade all calibre installations to version 8.14.0 or later to remediate this vulnerability. Additionally, implement strict controls on the sources of FB2 files, including scanning and sandboxing incoming e-book files before allowing users to open or convert them. Employ endpoint protection solutions capable of detecting anomalous file writes or code execution attempts originating from calibre processes. Educate users about the risks of opening e-books from untrusted sources. For environments where immediate upgrade is not feasible, consider restricting calibre's filesystem permissions using OS-level controls or containerization to limit potential damage from exploitation. Regularly monitor logs for unusual activity related to calibre file operations. Finally, maintain an incident response plan tailored to potential endpoint compromise scenarios involving e-book management software.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T19:12:25.102Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690e812b0e7acb8066fb4466

Added to database: 11/7/2025, 11:30:51 PM

Last enriched: 11/7/2025, 11:45:42 PM

Last updated: 11/8/2025, 5:07:35 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats