Weak Password Requirements in janeczku/calibre-web
Description
Weak Password Requirements in GitHub repository janeczku/calibre-web prior to 0.6.20.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Weak password requirements in Calibre-Web prior to 0.6.20 allow attackers to easily brute-force user credentials.
Vulnerability
CVE-2023-2106 identifies a weakness in password requirements within the Calibre-Web application [1]. The software prior to version 0.6.20 does not enforce strong password policies, allowing users to set weak passwords that are easily guessable or susceptible to brute-force attacks [2]. The root cause is the lack of password complexity validation during account creation or password changes.
Exploitation
An attacker can exploit this vulnerability by enumerating usernames and attempting common passwords or conducting brute-force attacks against the application's login endpoint. No special network access is required beyond being able to reach the web interface. User interaction is not needed for exploitation; an automated script can be used [4].
Impact
Successful exploitation allows an attacker to gain unauthorized access to a victim's account. Depending on the user's permissions, this could lead to viewing, downloading, or modifying eBooks in the Calibre database. For administrative accounts, full control over the application and its data may be achieved [1].
Mitigation
The vulnerability is fixed in version 0.6.20 of Calibre-Web [3]. Users should update to this version or later to enforce stronger password policies. There is no evidence this CVE has been added to the CISA Known Exploited Vulnerabilities catalog.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
calibrewebPyPI | < 0.6.20 | 0.6.20 |
Affected products
2- janeczku/janeczku/calibre-webv5Range: unspecified
Patches
149e4f540c9b2** Be careful, after updating, there is no way back **
1 file changed · +546 −1877
test/Calibre-Web TestSummary_Linux.html+546 −1877 modified
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.