CVE-2026-27824: CWE-307: Improper Restriction of Excessive Authentication Attempts in kovidgoyal calibre
CVE-2026-27824 affects the calibre Content Server versions prior to 9. 4. 0 and involves improper restriction of excessive authentication attempts. The vulnerability arises because the server’s brute-force protection relies on a ban key derived from the client IP address and the X-Forwarded-For HTTP header, which is not validated or restricted to trusted proxies. Attackers can manipulate this header to bypass IP-based bans, rendering brute-force protections ineffective. This flaw enables credential stuffing and password guessing attacks on internet-exposed calibre servers. The issue is fixed in calibre version 9. 4. 0. The CVSS score is 5.
AI Analysis
Technical Summary
CVE-2026-27824 is a medium severity vulnerability in the calibre Content Server, a cross-platform e-book management system. The flaw stems from the server’s brute-force protection mechanism, which uses a ban key based on the client’s IP address and the X-Forwarded-For HTTP header to block repeated failed authentication attempts. However, the X-Forwarded-For header is accepted directly from incoming HTTP requests without validation or configuration to trust only known proxy sources. This allows an attacker to spoof or modify the X-Forwarded-For header arbitrarily, effectively circumventing IP-based bans by making the server believe requests originate from different IP addresses. Consequently, the brute-force protection becomes ineffective, exposing the server to credential stuffing and password guessing attacks. Since calibre servers are often deployed for remote access to e-book libraries, those exposed to the internet are particularly at risk. The vulnerability affects all versions prior to 9.4.0, where the issue has been addressed by properly validating or restricting the X-Forwarded-For header usage. The CVSS 3.1 score of 5.3 reflects the network attack vector, no required privileges or user interaction, and limited confidentiality impact, as successful exploitation could allow attackers to guess passwords but not directly compromise data integrity or availability. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The primary impact of this vulnerability is the increased risk of successful brute-force attacks against calibre Content Servers exposed to the internet. Attackers can bypass IP-based rate limiting and bans, enabling them to perform credential stuffing or password guessing attacks at scale. This can lead to unauthorized access to user accounts and potentially sensitive e-book collections or metadata. While the vulnerability does not directly compromise data integrity or availability, unauthorized access can lead to privacy violations and potential further exploitation depending on the environment in which calibre is deployed. Organizations relying on calibre servers for remote e-book access, especially those with weak or reused passwords, face heightened risk. The impact is magnified in scenarios where the server is publicly accessible without additional network-level protections. Overall, this vulnerability undermines a critical security control designed to prevent automated attacks, increasing the likelihood of account compromise and data exposure.
Mitigation Recommendations
The primary mitigation is to upgrade calibre Content Server to version 9.4.0 or later, where the vulnerability is fixed by proper validation or trusted-proxy configuration of the X-Forwarded-For header. For organizations unable to upgrade immediately, network-level mitigations should be implemented, such as restricting access to the calibre server via VPN or firewall rules to trusted IP ranges. Additionally, administrators should disable or limit the use of the X-Forwarded-For header if possible or configure the server to trust only known proxy IPs. Implementing multi-factor authentication (MFA) for user accounts can significantly reduce the risk of unauthorized access even if brute-force attempts succeed. Monitoring authentication logs for unusual failed login patterns and employing external rate-limiting or web application firewalls (WAFs) can provide additional layers of defense. Finally, educating users to use strong, unique passwords reduces the effectiveness of credential stuffing attacks.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, Netherlands, Sweden
CVE-2026-27824: CWE-307: Improper Restriction of Excessive Authentication Attempts in kovidgoyal calibre
Description
CVE-2026-27824 affects the calibre Content Server versions prior to 9. 4. 0 and involves improper restriction of excessive authentication attempts. The vulnerability arises because the server’s brute-force protection relies on a ban key derived from the client IP address and the X-Forwarded-For HTTP header, which is not validated or restricted to trusted proxies. Attackers can manipulate this header to bypass IP-based bans, rendering brute-force protections ineffective. This flaw enables credential stuffing and password guessing attacks on internet-exposed calibre servers. The issue is fixed in calibre version 9. 4. 0. The CVSS score is 5.
AI-Powered Analysis
Technical Analysis
CVE-2026-27824 is a medium severity vulnerability in the calibre Content Server, a cross-platform e-book management system. The flaw stems from the server’s brute-force protection mechanism, which uses a ban key based on the client’s IP address and the X-Forwarded-For HTTP header to block repeated failed authentication attempts. However, the X-Forwarded-For header is accepted directly from incoming HTTP requests without validation or configuration to trust only known proxy sources. This allows an attacker to spoof or modify the X-Forwarded-For header arbitrarily, effectively circumventing IP-based bans by making the server believe requests originate from different IP addresses. Consequently, the brute-force protection becomes ineffective, exposing the server to credential stuffing and password guessing attacks. Since calibre servers are often deployed for remote access to e-book libraries, those exposed to the internet are particularly at risk. The vulnerability affects all versions prior to 9.4.0, where the issue has been addressed by properly validating or restricting the X-Forwarded-For header usage. The CVSS 3.1 score of 5.3 reflects the network attack vector, no required privileges or user interaction, and limited confidentiality impact, as successful exploitation could allow attackers to guess passwords but not directly compromise data integrity or availability. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The primary impact of this vulnerability is the increased risk of successful brute-force attacks against calibre Content Servers exposed to the internet. Attackers can bypass IP-based rate limiting and bans, enabling them to perform credential stuffing or password guessing attacks at scale. This can lead to unauthorized access to user accounts and potentially sensitive e-book collections or metadata. While the vulnerability does not directly compromise data integrity or availability, unauthorized access can lead to privacy violations and potential further exploitation depending on the environment in which calibre is deployed. Organizations relying on calibre servers for remote e-book access, especially those with weak or reused passwords, face heightened risk. The impact is magnified in scenarios where the server is publicly accessible without additional network-level protections. Overall, this vulnerability undermines a critical security control designed to prevent automated attacks, increasing the likelihood of account compromise and data exposure.
Mitigation Recommendations
The primary mitigation is to upgrade calibre Content Server to version 9.4.0 or later, where the vulnerability is fixed by proper validation or trusted-proxy configuration of the X-Forwarded-For header. For organizations unable to upgrade immediately, network-level mitigations should be implemented, such as restricting access to the calibre server via VPN or firewall rules to trusted IP ranges. Additionally, administrators should disable or limit the use of the X-Forwarded-For header if possible or configure the server to trust only known proxy IPs. Implementing multi-factor authentication (MFA) for user accounts can significantly reduce the risk of unauthorized access even if brute-force attempts succeed. Monitoring authentication logs for unusual failed login patterns and employing external rate-limiting or web application firewalls (WAFs) can provide additional layers of defense. Finally, educating users to use strong, unique passwords reduces the effectiveness of credential stuffing attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T02:32:39.799Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a1f6db32ffcdb8a26bc2e5
Added to database: 2/27/2026, 7:56:11 PM
Last enriched: 2/27/2026, 8:12:40 PM
Last updated: 2/27/2026, 10:13:21 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28414: CWE-36: Absolute Path Traversal in gradio-app gradio
HighCVE-2026-27939: CWE-287: Improper Authentication in statamic cms
HighCVE-2026-28416: CWE-918: Server-Side Request Forgery (SSRF) in gradio-app gradio
HighCVE-2026-28415: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gradio-app gradio
MediumCVE-2026-28411: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.