CVE-2025-64486: CWE-73: External Control of File Name or Path in kovidgoyal calibre
calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0.
AI Analysis
Technical Summary
CVE-2025-64486 is a critical security vulnerability identified in the calibre e-book management software, specifically affecting versions 8.13.0 and earlier. The root cause is improper validation of filenames when calibre processes binary assets embedded within FictionBook (FB2) files. This lack of validation allows an attacker to craft a malicious FB2 file containing specially named binary assets that, when opened or converted by calibre, can cause arbitrary files to be written to arbitrary locations on the victim's filesystem. This external control of file name or path (CWE-73) can be leveraged to execute arbitrary code with the privileges of the user running calibre. The vulnerability does not require authentication but does require user interaction, such as opening or converting the malicious FB2 file. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits have been reported in the wild, the severity and ease of exploitation make it a critical threat. The issue was publicly disclosed on November 7, 2025, and fixed in calibre version 8.14.0. Calibre is widely used for managing e-books, including in academic, publishing, and personal environments, making this vulnerability relevant for users who handle FB2 files.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in sectors where e-books and digital document management are common, such as education, publishing, libraries, and research institutions. An attacker could exploit this flaw to execute arbitrary code on systems running vulnerable calibre versions, potentially leading to data theft, system compromise, or lateral movement within networks. The ability to write arbitrary files could also be used to implant persistent malware or ransomware. Given calibre's cross-platform usage, both Windows and Linux systems could be affected. The impact extends to confidentiality, integrity, and availability of affected systems. Organizations that allow users to open or convert FB2 files without strict controls are particularly vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge following public disclosure.
Mitigation Recommendations
European organizations should immediately update all calibre installations to version 8.14.0 or later to remediate this vulnerability. Until updates can be applied, organizations should implement strict controls on the handling of FB2 files, including blocking or sandboxing untrusted FB2 files and restricting user permissions to prevent arbitrary file writes. Employ endpoint protection solutions capable of detecting suspicious file system activity related to calibre processes. Educate users about the risks of opening FB2 files from untrusted sources. Network segmentation can limit the impact of a compromised host. Additionally, monitoring logs for unusual file creation or modification events related to calibre can help detect exploitation attempts. Organizations should also review and harden file system permissions to minimize the potential damage from arbitrary file writes.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2025-64486: CWE-73: External Control of File Name or Path in kovidgoyal calibre
Description
calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-64486 is a critical security vulnerability identified in the calibre e-book management software, specifically affecting versions 8.13.0 and earlier. The root cause is improper validation of filenames when calibre processes binary assets embedded within FictionBook (FB2) files. This lack of validation allows an attacker to craft a malicious FB2 file containing specially named binary assets that, when opened or converted by calibre, can cause arbitrary files to be written to arbitrary locations on the victim's filesystem. This external control of file name or path (CWE-73) can be leveraged to execute arbitrary code with the privileges of the user running calibre. The vulnerability does not require authentication but does require user interaction, such as opening or converting the malicious FB2 file. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits have been reported in the wild, the severity and ease of exploitation make it a critical threat. The issue was publicly disclosed on November 7, 2025, and fixed in calibre version 8.14.0. Calibre is widely used for managing e-books, including in academic, publishing, and personal environments, making this vulnerability relevant for users who handle FB2 files.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in sectors where e-books and digital document management are common, such as education, publishing, libraries, and research institutions. An attacker could exploit this flaw to execute arbitrary code on systems running vulnerable calibre versions, potentially leading to data theft, system compromise, or lateral movement within networks. The ability to write arbitrary files could also be used to implant persistent malware or ransomware. Given calibre's cross-platform usage, both Windows and Linux systems could be affected. The impact extends to confidentiality, integrity, and availability of affected systems. Organizations that allow users to open or convert FB2 files without strict controls are particularly vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge following public disclosure.
Mitigation Recommendations
European organizations should immediately update all calibre installations to version 8.14.0 or later to remediate this vulnerability. Until updates can be applied, organizations should implement strict controls on the handling of FB2 files, including blocking or sandboxing untrusted FB2 files and restricting user permissions to prevent arbitrary file writes. Employ endpoint protection solutions capable of detecting suspicious file system activity related to calibre processes. Educate users about the risks of opening FB2 files from untrusted sources. Network segmentation can limit the impact of a compromised host. Additionally, monitoring logs for unusual file creation or modification events related to calibre can help detect exploitation attempts. Organizations should also review and harden file system permissions to minimize the potential damage from arbitrary file writes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-05T19:12:25.102Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690e812b0e7acb8066fb4466
Added to database: 11/7/2025, 11:30:51 PM
Last enriched: 11/14/2025, 11:51:26 PM
Last updated: 12/23/2025, 12:44:47 AM
Views: 247
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-7316: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation Mitsubishi Electric CNC M800V Series M800VW
MediumCVE-2023-52163: n/a
HighCVE-2025-66735: n/a
HighCVE-2025-68480: CWE-405: Asymmetric Resource Consumption (Amplification) in marshmallow-code marshmallow
MediumCVE-2025-68476: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kedacore keda
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.