๐Ÿ” CVE Alert

CVE-2026-42886

MEDIUM 4.9

Audiobookshelf: Memory amplification DoS via oversized compressed details entry in backup upload

CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th

Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the POST /api/backups/upload endpoint decompresses the details entry from an uploaded .audiobookshelf ZIP file entirely into memory using zip.entryData(), with no limit on the decompressed size. The upload middleware also has no file size limit. An admin user can upload a crafted ZIP containing a highly compressed details entry that, when decompressed, consumes hundreds of megabytes or gigabytes of memory, crashing the server process via out-of-memory. This vulnerability is fixed in 2.32.2.

CWE CWE-409
Vendor advplyr
Product audiobookshelf
Published May 11, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for advplyr audiobookshelf

Be the first to know when new medium vulnerabilities affecting advplyr audiobookshelf are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

advplyr / audiobookshelf
< 2.33.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-4jq4-rvq8-j26h