CVE-2026-25635: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in 9.2.0.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-25635 affects the calibre e-book manager, specifically its CHM (Microsoft Compiled HTML Help) reader component, in versions prior to 9.2.0. It is categorized under CWE-22, which involves improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This flaw allows an attacker to manipulate file paths processed by the CHM reader to write arbitrary files to any location where the current user has write permissions. On Windows platforms, this can be exploited to achieve remote code execution (RCE) by writing a malicious executable or script to the Startup folder, causing the payload to run automatically upon the next user login. The vulnerability requires the victim to open a crafted CHM file, thus involving user interaction, and does not require elevated privileges or authentication. The CVSS v3.1 base score is 8.6 (high), reflecting the critical impact on confidentiality, integrity, and availability, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and scope changed (S:C). The vulnerability was published on February 6, 2026, and has been addressed in calibre version 9.2.0. There are no known exploits reported in the wild as of now. The vulnerability poses a significant risk especially in environments where calibre is used on Windows systems and users may open untrusted CHM files.
Potential Impact
For European organizations, this vulnerability presents a significant risk primarily on Windows endpoints where calibre is installed and used. Successful exploitation can lead to arbitrary file writes and remote code execution, potentially allowing attackers to execute malicious code with the privileges of the logged-in user. This can result in data theft, system compromise, lateral movement within networks, and persistence through startup folder payloads. Organizations in sectors with high use of e-book management or digital libraries, such as education, publishing, and research institutions, may be particularly impacted. The vulnerability could also be leveraged in targeted attacks or phishing campaigns involving malicious CHM files. Given the high CVSS score and the ability to achieve RCE, the impact on confidentiality, integrity, and availability is severe. However, exploitation requires user interaction and local access, which somewhat limits the attack surface compared to remote vulnerabilities. Nonetheless, the risk remains substantial for organizations with insufficient endpoint protection or user awareness.
Mitigation Recommendations
European organizations should immediately upgrade all calibre installations to version 9.2.0 or later to remediate this vulnerability. Until upgrades can be performed, organizations should implement strict controls on the handling of CHM files, including blocking or quarantining CHM attachments in email gateways and endpoint security solutions. User education campaigns should emphasize the risks of opening untrusted CHM files and encourage caution with unknown e-book sources. Endpoint detection and response (EDR) tools should be configured to monitor and alert on suspicious file writes to startup folders or unusual process executions triggered by calibre. Application whitelisting can prevent unauthorized executables from running at startup. Network segmentation and least privilege principles should be enforced to limit the impact of potential compromises. Regular vulnerability scanning and patch management processes should be enhanced to ensure timely updates of calibre and other software. Finally, incident response plans should be updated to include detection and remediation steps for exploitation attempts involving this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2026-25635: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
Description
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in 9.2.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-25635 affects the calibre e-book manager, specifically its CHM (Microsoft Compiled HTML Help) reader component, in versions prior to 9.2.0. It is categorized under CWE-22, which involves improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This flaw allows an attacker to manipulate file paths processed by the CHM reader to write arbitrary files to any location where the current user has write permissions. On Windows platforms, this can be exploited to achieve remote code execution (RCE) by writing a malicious executable or script to the Startup folder, causing the payload to run automatically upon the next user login. The vulnerability requires the victim to open a crafted CHM file, thus involving user interaction, and does not require elevated privileges or authentication. The CVSS v3.1 base score is 8.6 (high), reflecting the critical impact on confidentiality, integrity, and availability, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and scope changed (S:C). The vulnerability was published on February 6, 2026, and has been addressed in calibre version 9.2.0. There are no known exploits reported in the wild as of now. The vulnerability poses a significant risk especially in environments where calibre is used on Windows systems and users may open untrusted CHM files.
Potential Impact
For European organizations, this vulnerability presents a significant risk primarily on Windows endpoints where calibre is installed and used. Successful exploitation can lead to arbitrary file writes and remote code execution, potentially allowing attackers to execute malicious code with the privileges of the logged-in user. This can result in data theft, system compromise, lateral movement within networks, and persistence through startup folder payloads. Organizations in sectors with high use of e-book management or digital libraries, such as education, publishing, and research institutions, may be particularly impacted. The vulnerability could also be leveraged in targeted attacks or phishing campaigns involving malicious CHM files. Given the high CVSS score and the ability to achieve RCE, the impact on confidentiality, integrity, and availability is severe. However, exploitation requires user interaction and local access, which somewhat limits the attack surface compared to remote vulnerabilities. Nonetheless, the risk remains substantial for organizations with insufficient endpoint protection or user awareness.
Mitigation Recommendations
European organizations should immediately upgrade all calibre installations to version 9.2.0 or later to remediate this vulnerability. Until upgrades can be performed, organizations should implement strict controls on the handling of CHM files, including blocking or quarantining CHM attachments in email gateways and endpoint security solutions. User education campaigns should emphasize the risks of opening untrusted CHM files and encourage caution with unknown e-book sources. Endpoint detection and response (EDR) tools should be configured to monitor and alert on suspicious file writes to startup folders or unusual process executions triggered by calibre. Application whitelisting can prevent unauthorized executables from running at startup. Network segmentation and least privilege principles should be enforced to limit the impact of potential compromises. Regular vulnerability scanning and patch management processes should be enhanced to ensure timely updates of calibre and other software. Finally, incident response plans should be updated to include detection and remediation steps for exploitation attempts involving this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-04T05:15:41.790Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69864f52f9fa50a62f30f2e0
Added to database: 2/6/2026, 8:30:10 PM
Last enriched: 2/14/2026, 11:45:46 AM
Last updated: 3/24/2026, 12:46:45 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.