Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Calibre-ebook
Calibre-ebook calibre |
|
| CPEs | cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Calibre-ebook
Calibre-ebook calibre |
|
| Metrics |
cvssV3_1
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kovidgoyal
Kovidgoyal calibre |
|
| Vendors & Products |
Kovidgoyal
Kovidgoyal calibre |
Fri, 27 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix. | |
| Title | calibre has a path traversal vulnerability | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T14:48:44.155Z
Reserved: 2026-03-17T23:23:58.312Z
Link: CVE-2026-33206
Updated: 2026-03-27T14:48:29.828Z
Status : Analyzed
Published: 2026-03-27T15:16:54.453
Modified: 2026-03-30T20:46:25.807
Link: CVE-2026-33206
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:01:17Z