CVE-2026-26065: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
CVE-2026-26065 is a critical path traversal vulnerability in calibre versions 9. 2. 1 and below. It allows attackers to write arbitrary files with arbitrary content and extensions anywhere the user has write permissions by exploiting PDB readers. This can lead to code execution or denial of service via file corruption. The vulnerability arises from improper limitation of pathnames to restricted directories (CWE-22). Exploitation requires user interaction but no authentication, and the issue is fixed in calibre 9. 3. 0. No known exploits are currently in the wild.
AI Analysis
Technical Summary
Calibre, a widely used cross-platform e-book management software, versions 9.2.1 and earlier contain a critical path traversal vulnerability identified as CVE-2026-26065 (CWE-22). The flaw exists in the handling of PDB readers for both 132-byte and 202-byte header variants, where the software fails to properly restrict pathname inputs. This allows an attacker to craft malicious e-book files that cause calibre to write arbitrary files to any location where the user has write permissions. The files are written in binary mode ('wb'), silently overwriting existing files without validation. This arbitrary file write capability can be leveraged to execute malicious code if executable files are overwritten or created, or to cause denial of service by corrupting important files. Exploitation requires user interaction (opening or processing a malicious e-book) but no prior authentication or elevated privileges. The vulnerability has a CVSS 4.0 score of 9.3, indicating critical severity with high impact on confidentiality, integrity, and availability. The issue was publicly disclosed on February 20, 2026, and fixed in calibre version 9.3.0. No known exploits have been reported in the wild as of now.
Potential Impact
The vulnerability poses a significant risk to organizations and individuals using calibre for e-book management. Successful exploitation can lead to arbitrary code execution, allowing attackers to run malicious payloads with the privileges of the user running calibre. This can result in full system compromise, data theft, or lateral movement within networks. Additionally, denial of service can be induced by corrupting critical files, disrupting business operations. Since calibre is cross-platform and popular among users managing large e-book libraries, the attack surface is broad. The requirement for user interaction limits remote exploitation but social engineering or malicious e-book distribution campaigns could increase risk. The silent overwrite behavior exacerbates impact by potentially destroying important files without warning. Organizations relying on calibre in enterprise or educational environments may face operational disruptions and security breaches if unpatched.
Mitigation Recommendations
The primary mitigation is to upgrade calibre to version 9.3.0 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should implement strict controls on e-book file sources, avoiding untrusted or unknown files. Employ endpoint protection solutions capable of detecting anomalous file writes or suspicious behaviour related to calibre processes. Restrict user write permissions on critical directories to limit the scope of arbitrary file writes. Educate users about the risks of opening e-books from unverified sources to reduce the likelihood of social engineering exploitation. Monitor file system changes and application logs for unusual activity indicative of exploitation attempts. Consider sandboxing or running calibre with least privilege to contain potential damage. Regularly review and apply security updates for all software components.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2026-26065: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
Description
CVE-2026-26065 is a critical path traversal vulnerability in calibre versions 9. 2. 1 and below. It allows attackers to write arbitrary files with arbitrary content and extensions anywhere the user has write permissions by exploiting PDB readers. This can lead to code execution or denial of service via file corruption. The vulnerability arises from improper limitation of pathnames to restricted directories (CWE-22). Exploitation requires user interaction but no authentication, and the issue is fixed in calibre 9. 3. 0. No known exploits are currently in the wild.
AI-Powered Analysis
Technical Analysis
Calibre, a widely used cross-platform e-book management software, versions 9.2.1 and earlier contain a critical path traversal vulnerability identified as CVE-2026-26065 (CWE-22). The flaw exists in the handling of PDB readers for both 132-byte and 202-byte header variants, where the software fails to properly restrict pathname inputs. This allows an attacker to craft malicious e-book files that cause calibre to write arbitrary files to any location where the user has write permissions. The files are written in binary mode ('wb'), silently overwriting existing files without validation. This arbitrary file write capability can be leveraged to execute malicious code if executable files are overwritten or created, or to cause denial of service by corrupting important files. Exploitation requires user interaction (opening or processing a malicious e-book) but no prior authentication or elevated privileges. The vulnerability has a CVSS 4.0 score of 9.3, indicating critical severity with high impact on confidentiality, integrity, and availability. The issue was publicly disclosed on February 20, 2026, and fixed in calibre version 9.3.0. No known exploits have been reported in the wild as of now.
Potential Impact
The vulnerability poses a significant risk to organizations and individuals using calibre for e-book management. Successful exploitation can lead to arbitrary code execution, allowing attackers to run malicious payloads with the privileges of the user running calibre. This can result in full system compromise, data theft, or lateral movement within networks. Additionally, denial of service can be induced by corrupting critical files, disrupting business operations. Since calibre is cross-platform and popular among users managing large e-book libraries, the attack surface is broad. The requirement for user interaction limits remote exploitation but social engineering or malicious e-book distribution campaigns could increase risk. The silent overwrite behavior exacerbates impact by potentially destroying important files without warning. Organizations relying on calibre in enterprise or educational environments may face operational disruptions and security breaches if unpatched.
Mitigation Recommendations
The primary mitigation is to upgrade calibre to version 9.3.0 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should implement strict controls on e-book file sources, avoiding untrusted or unknown files. Employ endpoint protection solutions capable of detecting anomalous file writes or suspicious behaviour related to calibre processes. Restrict user write permissions on critical directories to limit the scope of arbitrary file writes. Educate users about the risks of opening e-books from unverified sources to reduce the likelihood of social engineering exploitation. Monitor file system changes and application logs for unusual activity indicative of exploitation attempts. Consider sandboxing or running calibre with least privilege to contain potential damage. Regularly review and apply security updates for all software components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-10T18:01:31.900Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6997c421d7880ec89b4b3324
Added to database: 2/20/2026, 2:17:05 AM
Last enriched: 2/20/2026, 2:31:20 AM
Last updated: 2/20/2026, 4:35:16 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2821: SQL Injection in Fujian Smart Integrated Management Platform System
MediumCVE-2026-2384: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ays-pro Quiz Maker
MediumCVE-2026-27017: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in refraction-networking utls
LowCVE-2026-26996: CWE-1333: Inefficient Regular Expression Complexity in isaacs minimatch
HighCVE-2026-26995
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.