Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4554-1 | calibre security update |
Tue, 17 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Calibre-ebook
Calibre-ebook calibre |
|
| CPEs | cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Calibre-ebook
Calibre-ebook calibre |
Wed, 11 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 10 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kovidgoyal
Kovidgoyal calibre |
|
| Vendors & Products |
Kovidgoyal
Kovidgoyal calibre |
Fri, 06 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0. | |
| Title | calibre has a Path Traversal Leading to Arbitrary File Corruption and Code Execution | |
| Weaknesses | CWE-22 CWE-73 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-11T14:51:19.827Z
Reserved: 2026-02-04T05:15:41.790Z
Link: CVE-2026-25636
Updated: 2026-02-11T14:51:19.827Z
Status : Analyzed
Published: 2026-02-06T21:16:18.833
Modified: 2026-02-17T21:23:11.340
Link: CVE-2026-25636
OpenCVE Enrichment
Updated: 2026-04-18T18:30:07Z
Debian DLA