VYPR
High severityNVD Advisory· Published Apr 15, 2023· Updated Feb 6, 2025

Weak Password Requirements in janeczku/calibre-web

CVE-2023-2106

Description

Weak Password Requirements in GitHub repository janeczku/calibre-web prior to 0.6.20.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Weak password requirements in Calibre-Web prior to 0.6.20 allow attackers to easily brute-force user credentials.

Vulnerability

CVE-2023-2106 identifies a weakness in password requirements within the Calibre-Web application [1]. The software prior to version 0.6.20 does not enforce strong password policies, allowing users to set weak passwords that are easily guessable or susceptible to brute-force attacks [2]. The root cause is the lack of password complexity validation during account creation or password changes.

Exploitation

An attacker can exploit this vulnerability by enumerating usernames and attempting common passwords or conducting brute-force attacks against the application's login endpoint. No special network access is required beyond being able to reach the web interface. User interaction is not needed for exploitation; an automated script can be used [4].

Impact

Successful exploitation allows an attacker to gain unauthorized access to a victim's account. Depending on the user's permissions, this could lead to viewing, downloading, or modifying eBooks in the Calibre database. For administrative accounts, full control over the application and its data may be achieved [1].

Mitigation

The vulnerability is fixed in version 0.6.20 of Calibre-Web [3]. Users should update to this version or later to enforce stronger password policies. There is no evidence this CVE has been added to the CISA Known Exploited Vulnerabilities catalog.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
calibrewebPyPI
< 0.6.200.6.20

Affected products

2

Patches

1
49e4f540c9b2

** Be careful, after updating, there is no way back **

https://github.com/janeczku/calibre-webOzzie IsaacsMar 4, 2023via ghsa
1 file changed · +546 1877
  • test/Calibre-Web TestSummary_Linux.html+546 1877 modified

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.