๐Ÿ” CVE Alert

CVE-2026-26064

UNKNOWN 0.0

calibre: Path Traversal Vulnerability Enables Arbitrary File Write and Remote Code Execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Function extract_pictures only checks startswith('Pictures'), and does not sanitize '..' sequences. calibre's own ZipFile.extractall() in utils/zipfile.py does sanitize '..' via _get_targetpath(), but extract_pictures() bypasses this by using manual zf.read() + open(). This issue has been fixed in version 9.3.0.

CWE CWE-22
Vendor kovidgoyal
Product calibre
Published Feb 20, 2026
Last Updated Feb 20, 2026
Stay Ahead of the Next One

Get instant alerts for kovidgoyal calibre

Be the first to know when new unknown vulnerabilities affecting kovidgoyal calibre are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

kovidgoyal / calibre
< 9.3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-72ch-3hqc-pgmp github.com: https://github.com/kovidgoyal/calibre/commit/e1b5f9b45a5e8fa96c136963ad9a1d35e6adac62