Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27810: CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') in kovidgoyal calibre

0
Medium
VulnerabilityCVE-2026-27810cvecve-2026-27810cwe-113
Published: Fri Feb 27 2026 (02/27/2026, 19:44:39 UTC)
Source: CVE Database V5
Vendor/Project: kovidgoyal
Product: calibre

Description

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:41:36 UTC

Technical Analysis

CVE-2026-27810 is a medium-severity vulnerability classified under CWE-113 (Improper Neutralization of CRLF Sequences in HTTP Headers), specifically an HTTP Response Header Injection in the calibre Content Server. calibre is a widely used cross-platform e-book management tool that includes a Content Server for remote access to e-books. Prior to version 9.4.0, the Content Server improperly sanitizes the 'content_disposition' query parameter in the '/get/' and '/data-files/get/' endpoints. This parameter is vulnerable to injection of CRLF (carriage return and line feed) sequences, enabling an attacker with authenticated access to inject arbitrary HTTP headers into server responses. This can lead to HTTP response splitting attacks, which may allow session fixation, web cache poisoning, cross-site scripting (XSS), or other malicious manipulations of HTTP responses. The vulnerability requires the attacker to be authenticated, but no additional user interaction is necessary, although an attacker can also trick authenticated users into clicking malicious links to trigger the exploit. The flaw affects all versions of calibre Content Server before 9.4.0, which contains the patch. No known exploits are currently reported in the wild. The CVSS v3.1 score is 6.4, reflecting network attack vector, low complexity, required privileges, no user interaction, and partial confidentiality and integrity impacts with no availability impact. This vulnerability highlights the importance of proper input validation and output encoding for HTTP headers in web services.

Potential Impact

The vulnerability allows attackers with authenticated access to inject arbitrary HTTP headers, enabling HTTP response splitting attacks. This can compromise confidentiality by hijacking user sessions or stealing sensitive information through manipulated responses. Integrity may be affected by altering server responses, potentially leading to web cache poisoning or cross-site scripting attacks. Although availability is not directly impacted, the manipulation of HTTP headers can degrade user trust and service reliability. Organizations using calibre Content Server in environments where multiple users authenticate remotely are at risk of internal threat actors or compromised accounts exploiting this flaw. The ability to trick authenticated users into clicking crafted links increases the attack surface, potentially enabling phishing or social engineering attacks that leverage this vulnerability. The medium severity score reflects the need for authentication but also the significant impact on confidentiality and integrity. Failure to patch could lead to exploitation in environments where calibre is used for e-book distribution, including educational institutions, libraries, and enterprises managing digital content.

Mitigation Recommendations

1. Upgrade all calibre Content Server instances to version 9.4.0 or later, which contains the fix for this vulnerability. 2. If immediate upgrade is not possible, restrict access to the Content Server to trusted networks and users only, minimizing exposure to authenticated attackers. 3. Implement strict input validation and sanitization on the 'content_disposition' parameter at the application or proxy level to prevent CRLF injection. 4. Employ web application firewalls (WAFs) with rules to detect and block HTTP response splitting attempts targeting the affected endpoints. 5. Educate users about the risks of clicking unsolicited or suspicious links, especially when authenticated to the Content Server. 6. Monitor server logs for unusual or malformed HTTP header injection attempts and investigate any anomalies promptly. 7. Consider implementing multi-factor authentication (MFA) to reduce the risk of compromised credentials enabling exploitation. 8. Review and limit privileges of users who can authenticate to the Content Server to reduce potential attack vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.267Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1f6db32ffcdb8a26bc2e2

Added to database: 2/27/2026, 7:56:11 PM

Last enriched: 3/6/2026, 9:41:36 PM

Last updated: 4/13/2026, 6:09:19 AM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses