Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27824: CWE-307: Improper Restriction of Excessive Authentication Attempts in kovidgoyal calibre

0
Medium
VulnerabilityCVE-2026-27824cvecve-2026-27824cwe-307cwe-346
Published: Fri Feb 27 2026 (02/27/2026, 19:46:07 UTC)
Source: CVE Database V5
Vendor/Project: kovidgoyal
Product: calibre

Description

CVE-2026-27824 affects the calibre Content Server versions prior to 9. 4. 0 and involves improper restriction of excessive authentication attempts. The vulnerability arises because the server’s brute-force protection relies on a ban key derived from the client IP address and the X-Forwarded-For HTTP header, which is not validated or restricted to trusted proxies. Attackers can manipulate this header to bypass IP-based bans, rendering brute-force protections ineffective. This flaw enables credential stuffing and password guessing attacks on internet-exposed calibre servers. The issue is fixed in calibre version 9. 4. 0. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/27/2026, 20:12:40 UTC

Technical Analysis

CVE-2026-27824 is a medium severity vulnerability in the calibre Content Server, a cross-platform e-book management system. The flaw stems from the server’s brute-force protection mechanism, which uses a ban key based on the client’s IP address and the X-Forwarded-For HTTP header to block repeated failed authentication attempts. However, the X-Forwarded-For header is accepted directly from incoming HTTP requests without validation or configuration to trust only known proxy sources. This allows an attacker to spoof or modify the X-Forwarded-For header arbitrarily, effectively circumventing IP-based bans by making the server believe requests originate from different IP addresses. Consequently, the brute-force protection becomes ineffective, exposing the server to credential stuffing and password guessing attacks. Since calibre servers are often deployed for remote access to e-book libraries, those exposed to the internet are particularly at risk. The vulnerability affects all versions prior to 9.4.0, where the issue has been addressed by properly validating or restricting the X-Forwarded-For header usage. The CVSS 3.1 score of 5.3 reflects the network attack vector, no required privileges or user interaction, and limited confidentiality impact, as successful exploitation could allow attackers to guess passwords but not directly compromise data integrity or availability. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of this vulnerability is the increased risk of successful brute-force attacks against calibre Content Servers exposed to the internet. Attackers can bypass IP-based rate limiting and bans, enabling them to perform credential stuffing or password guessing attacks at scale. This can lead to unauthorized access to user accounts and potentially sensitive e-book collections or metadata. While the vulnerability does not directly compromise data integrity or availability, unauthorized access can lead to privacy violations and potential further exploitation depending on the environment in which calibre is deployed. Organizations relying on calibre servers for remote e-book access, especially those with weak or reused passwords, face heightened risk. The impact is magnified in scenarios where the server is publicly accessible without additional network-level protections. Overall, this vulnerability undermines a critical security control designed to prevent automated attacks, increasing the likelihood of account compromise and data exposure.

Mitigation Recommendations

The primary mitigation is to upgrade calibre Content Server to version 9.4.0 or later, where the vulnerability is fixed by proper validation or trusted-proxy configuration of the X-Forwarded-For header. For organizations unable to upgrade immediately, network-level mitigations should be implemented, such as restricting access to the calibre server via VPN or firewall rules to trusted IP ranges. Additionally, administrators should disable or limit the use of the X-Forwarded-For header if possible or configure the server to trust only known proxy IPs. Implementing multi-factor authentication (MFA) for user accounts can significantly reduce the risk of unauthorized access even if brute-force attempts succeed. Monitoring authentication logs for unusual failed login patterns and employing external rate-limiting or web application firewalls (WAFs) can provide additional layers of defense. Finally, educating users to use strong, unique passwords reduces the effectiveness of credential stuffing attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1f6db32ffcdb8a26bc2e5

Added to database: 2/27/2026, 7:56:11 PM

Last enriched: 2/27/2026, 8:12:40 PM

Last updated: 2/27/2026, 10:13:21 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses