VYPR
Moderate severityNVD Advisory· Published Apr 15, 2023· Updated Feb 6, 2025

Improper Restriction of Excessive Authentication Attempts in janeczku/calibre-web

CVE-2022-2525

Description

Improper Restriction of Excessive Authentication Attempts in GitHub repository janeczku/calibre-web prior to 0.6.20.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Calibre Web before 0.6.20 lacks rate limiting on login, enabling brute-force password guessing attacks against user accounts.

Vulnerability

CVE-2022-2525 is an improper restriction of excessive authentication attempts in the Calibre Web application, specifically in versions prior to 0.6.20. The software fails to enforce rate limiting or any mechanism to block repeated login failures, leaving the authentication endpoint open to unlimited password guessing attempts. The issue was fixed in commit [49e4f540c9b204c7e39b3c27ceadecd83ed60e7e] in the official repository [1][2].

Exploitation

The attack vector is the login page exposed by the Calibre Web server. An attacker with network access to the application can send an arbitrary number of login requests with different credentials without being throttled or locked out. No prior authentication or special privileges are needed to conduct the attack; the only requirement is that the attacker can reach the application's login interface [1][3].

Impact

Successful exploitation allows an attacker to brute-force user passwords by systematically trying common or guessed passwords against known or enumerated usernames. Since there is no account lockout or CAPTCHA, the attacker can continue guessing until the correct password is found. This could lead to full account compromise, including any administrative accesses if a privileged user's password is cracked [1][3].

Mitigation

Calibre Web users must upgrade to version 0.6.20 or later, which includes the commit that adds authentication rate limiting. There is no known workaround to mitigate the vulnerability without applying the patch [1][2]. The CVE has not yet been listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, but the risk of brute-force attacks is well established. Users still running older versions should treat their instances as vulnerable and prioritize an upgrade.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
calibrewebPyPI
< 0.6.200.6.20

Affected products

2

Patches

1
49e4f540c9b2

** Be careful, after updating, there is no way back **

https://github.com/janeczku/calibre-webOzzie IsaacsMar 4, 2023via ghsa
1 file changed · +546 1877
  • test/Calibre-Web TestSummary_Linux.html+546 1877 modified

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.