VYPR
Critical severityNVD Advisory· Published May 16, 2022· Updated Aug 3, 2024

CVE-2022-30765

CVE-2022-30765

Description

Calibre-Web before 0.6.18 allows user table SQL Injection.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Calibre-Web before 0.6.18 has a SQL injection vulnerability in the user table, enabling potential database attacks.

Vulnerability

Calibre-Web before version 0.6.18 contains a SQL injection vulnerability in the user table. The vulnerability is present in versions prior to the fix released in 0.6.18 [2][4]. The exact code path and required configuration are not detailed in the available references.

Exploitation

An attacker with network access to the Calibre-Web application could exploit this SQL injection. The necessary privileges and exact steps are not disclosed in the references, but the vulnerability is classified as user table SQL injection, suggesting potential for database manipulation [2][4].

Impact

Successful exploitation could allow an attacker to read, modify, or delete data in the user table, potentially leading to unauthorized access, privilege escalation, or disclosure of user credentials and other sensitive information [2][4].

Mitigation

Upgrade to Calibre-Web version 0.6.18 or later, which includes the security fix [4]. No workarounds have been published. Users should always run the latest version as recommended in the security policy [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
calibrewebPyPI
< 0.6.180.6.18

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.