Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27824: CWE-307: Improper Restriction of Excessive Authentication Attempts in kovidgoyal calibre

0
Medium
VulnerabilityCVE-2026-27824cvecve-2026-27824cwe-307cwe-346
Published: Fri Feb 27 2026 (02/27/2026, 19:46:07 UTC)
Source: CVE Database V5
Vendor/Project: kovidgoyal
Product: calibre

Description

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:41:59 UTC

Technical Analysis

Calibre is a widely used cross-platform e-book management application that includes a Content Server for remote access to e-book libraries. Prior to version 9.4.0, the Content Server implemented brute-force protection by banning IP addresses after excessive failed authentication attempts. This ban key was generated using the client's remote IP address combined with the X-Forwarded-For HTTP header. However, the server reads the X-Forwarded-For header directly from incoming HTTP requests without validating whether the header originates from a trusted proxy. Since HTTP headers can be easily spoofed by an attacker, this allows them to manipulate the X-Forwarded-For value to evade IP bans. Consequently, the brute-force protection mechanism can be bypassed, enabling attackers to perform unlimited password guessing or credential stuffing attacks against the server. This vulnerability is classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) and CWE-346 (Origin Validation Error). The vulnerability affects all calibre Content Server instances exposed to the internet running versions earlier than 9.4.0. The issue does not require any authentication or user interaction to exploit, and no known exploits are currently observed in the wild. The vendor addressed this flaw in version 9.4.0 by properly validating or restricting the use of the X-Forwarded-For header to trusted proxies only, restoring the effectiveness of brute-force protections.

Potential Impact

The primary impact of this vulnerability is the potential compromise of user credentials on calibre Content Servers exposed to the internet. By bypassing brute-force protections, attackers can perform unlimited password guessing or credential stuffing attacks, increasing the likelihood of unauthorized access. This can lead to unauthorized disclosure of e-book libraries, user privacy violations, and potential further exploitation if credentials are reused elsewhere. Although the vulnerability does not directly affect system integrity or availability, successful unauthorized access could enable attackers to manipulate or delete content. Organizations relying on calibre servers for remote e-book access are at risk, especially if they use weak or reused passwords. The medium CVSS score (5.3) reflects the moderate confidentiality impact and ease of exploitation without authentication or user interaction. The lack of known exploits in the wild suggests limited active exploitation but does not diminish the risk for exposed servers.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade all calibre Content Server instances to version 9.4.0 or later, where the issue is fixed. Until upgrading is possible, administrators should restrict access to the calibre Content Server by implementing network-level controls such as IP whitelisting, VPN access, or firewall rules to limit exposure to trusted users only. Additionally, configuring reverse proxies or load balancers to properly validate and sanitize the X-Forwarded-For header can help prevent header spoofing. Enforcing strong, unique passwords and enabling multi-factor authentication (if supported) will reduce the risk of successful brute-force attacks. Monitoring authentication logs for repeated failed attempts and implementing alerting can provide early detection of attack attempts. Finally, disabling or limiting the Content Server's internet exposure when not necessary is recommended to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1f6db32ffcdb8a26bc2e5

Added to database: 2/27/2026, 7:56:11 PM

Last enriched: 3/6/2026, 9:41:59 PM

Last updated: 4/14/2026, 12:04:11 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses