CVE-2026-26064: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
CVE-2026-26064 is a critical path traversal vulnerability in calibre versions 9. 2. 1 and below that allows arbitrary file writes. The flaw exists in the extract_pictures function, which improperly validates file paths, enabling attackers to write files outside intended directories. On Windows, this can lead to remote code execution by placing malicious payloads in the Startup folder, executed upon user login. The vulnerability arises because extract_pictures bypasses calibre's usual path sanitization by manually reading and writing zip file contents. This issue is fixed in calibre 9. 3. 0. Exploitation requires user interaction but no authentication, and the vulnerability has a CVSS 4.
AI Analysis
Technical Summary
Calibre, a popular cross-platform e-book management software, versions 9.2.1 and earlier contain a critical path traversal vulnerability (CVE-2026-26064) classified under CWE-22. The vulnerability is located in the extract_pictures function, which is responsible for extracting images from e-book archives. Unlike the standard ZipFile.extractall() method in calibre that sanitizes file paths to prevent directory traversal attacks, extract_pictures performs manual extraction by reading zip entries and writing them directly to disk without proper validation. Specifically, it only checks if the filename starts with 'Pictures' but fails to sanitize '..' sequences that can traverse directories. This flaw allows an attacker to craft a malicious e-book archive containing files with paths designed to write arbitrary files anywhere the user has write permissions. On Windows systems, this can be exploited to write a malicious executable or script into the Startup folder, resulting in remote code execution upon the next user login. The vulnerability requires user interaction (opening a malicious e-book) but no prior authentication or elevated privileges. The issue was publicly disclosed and fixed in calibre version 9.3.0. The CVSS 4.0 base score is 9.3, reflecting critical severity due to high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no privileges required. No known exploits in the wild have been reported yet, but the potential for impactful attacks is significant given calibre's widespread use.
Potential Impact
This vulnerability poses a severe risk to organizations and individual users who utilize vulnerable versions of calibre for e-book management. Successful exploitation can lead to arbitrary file writes, enabling attackers to implant malicious payloads on affected systems. On Windows, this escalates to remote code execution, potentially allowing full system compromise, data theft, or persistence through startup scripts. The impact extends to confidentiality, integrity, and availability of systems. Organizations relying on calibre in enterprise environments, especially those handling sensitive information or operating in regulated sectors, face risks of malware infection, lateral movement, and data breaches. The requirement for user interaction (opening a malicious e-book) somewhat limits mass exploitation but targeted attacks against specific users or organizations remain highly feasible. Additionally, the vulnerability undermines trust in e-book files and digital content distribution channels. The absence of known exploits in the wild suggests an opportunity for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
The primary mitigation is to upgrade calibre to version 9.3.0 or later, where the vulnerability is patched. Until then, organizations should implement strict file system permissions to limit write access, especially to sensitive directories like the Windows Startup folder. Employ endpoint protection solutions capable of detecting suspicious file writes or execution from startup locations. Educate users to avoid opening e-books from untrusted or unknown sources. Consider sandboxing or running calibre in a restricted environment to contain potential exploitation. Monitor logs for unusual file creation or execution events related to calibre usage. For environments where immediate upgrade is not feasible, disabling the extract_pictures feature or restricting its usage may reduce risk. Regularly review and apply security updates for all software components. Finally, maintain robust backup and incident response plans to recover from potential compromises.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2026-26064: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
Description
CVE-2026-26064 is a critical path traversal vulnerability in calibre versions 9. 2. 1 and below that allows arbitrary file writes. The flaw exists in the extract_pictures function, which improperly validates file paths, enabling attackers to write files outside intended directories. On Windows, this can lead to remote code execution by placing malicious payloads in the Startup folder, executed upon user login. The vulnerability arises because extract_pictures bypasses calibre's usual path sanitization by manually reading and writing zip file contents. This issue is fixed in calibre 9. 3. 0. Exploitation requires user interaction but no authentication, and the vulnerability has a CVSS 4.
AI-Powered Analysis
Technical Analysis
Calibre, a popular cross-platform e-book management software, versions 9.2.1 and earlier contain a critical path traversal vulnerability (CVE-2026-26064) classified under CWE-22. The vulnerability is located in the extract_pictures function, which is responsible for extracting images from e-book archives. Unlike the standard ZipFile.extractall() method in calibre that sanitizes file paths to prevent directory traversal attacks, extract_pictures performs manual extraction by reading zip entries and writing them directly to disk without proper validation. Specifically, it only checks if the filename starts with 'Pictures' but fails to sanitize '..' sequences that can traverse directories. This flaw allows an attacker to craft a malicious e-book archive containing files with paths designed to write arbitrary files anywhere the user has write permissions. On Windows systems, this can be exploited to write a malicious executable or script into the Startup folder, resulting in remote code execution upon the next user login. The vulnerability requires user interaction (opening a malicious e-book) but no prior authentication or elevated privileges. The issue was publicly disclosed and fixed in calibre version 9.3.0. The CVSS 4.0 base score is 9.3, reflecting critical severity due to high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no privileges required. No known exploits in the wild have been reported yet, but the potential for impactful attacks is significant given calibre's widespread use.
Potential Impact
This vulnerability poses a severe risk to organizations and individual users who utilize vulnerable versions of calibre for e-book management. Successful exploitation can lead to arbitrary file writes, enabling attackers to implant malicious payloads on affected systems. On Windows, this escalates to remote code execution, potentially allowing full system compromise, data theft, or persistence through startup scripts. The impact extends to confidentiality, integrity, and availability of systems. Organizations relying on calibre in enterprise environments, especially those handling sensitive information or operating in regulated sectors, face risks of malware infection, lateral movement, and data breaches. The requirement for user interaction (opening a malicious e-book) somewhat limits mass exploitation but targeted attacks against specific users or organizations remain highly feasible. Additionally, the vulnerability undermines trust in e-book files and digital content distribution channels. The absence of known exploits in the wild suggests an opportunity for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
The primary mitigation is to upgrade calibre to version 9.3.0 or later, where the vulnerability is patched. Until then, organizations should implement strict file system permissions to limit write access, especially to sensitive directories like the Windows Startup folder. Employ endpoint protection solutions capable of detecting suspicious file writes or execution from startup locations. Educate users to avoid opening e-books from untrusted or unknown sources. Consider sandboxing or running calibre in a restricted environment to contain potential exploitation. Monitor logs for unusual file creation or execution events related to calibre usage. For environments where immediate upgrade is not feasible, disabling the extract_pictures feature or restricting its usage may reduce risk. Regularly review and apply security updates for all software components. Finally, maintain robust backup and incident response plans to recover from potential compromises.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-10T18:01:31.900Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6997c421d7880ec89b4b3320
Added to database: 2/20/2026, 2:17:05 AM
Last enriched: 2/20/2026, 2:31:34 AM
Last updated: 2/20/2026, 4:30:13 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2821: SQL Injection in Fujian Smart Integrated Management Platform System
MediumCVE-2026-2384: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ays-pro Quiz Maker
MediumCVE-2026-27017: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in refraction-networking utls
LowCVE-2026-26996: CWE-1333: Inefficient Regular Expression Complexity in isaacs minimatch
HighCVE-2026-26995
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.