CVE-2024-39123
Description
In janeczku Calibre-Web 0.6.0 to 0.6.21, the edit_book_comments function is vulnerable to Cross Site Scripting (XSS) due to improper sanitization performed by the clean_string function. The vulnerability arises from the way the clean_string function handles HTML sanitization.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Calibre-Web 0.6.0 to 0.6.21 has a stored XSS in edit_book_comments due to insufficient HTML sanitization, allowing arbitrary script execution.
Vulnerability
Overview A stored cross-site scripting (XSS) vulnerability exists in the edit_book_comments function of Calibre-Web versions 0.6.0 through 0.6.21 [2]. The root cause is improper sanitization performed by the clean_string function, which fails to adequately neutralize malicious HTML input [1][2].
Exploitation
Details An attacker with access to upload or edit book metadata can inject a malicious payload into the book's description (Comments) field [3]. For example, using a crafted `` tag with JavaScript encoding bypasses the weak filters [3]. The payload is stored and executed when a victim views the book details and interacts with the injected content, such as clicking a hyperlink [3]. No authentication beyond a valid user account is required, making this a stored XSS attack that targets other users [3].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session [3]. This can lead to data theft, session hijacking, defacement, or further actions within the Calibre-Web application [2][3].
Mitigation
The vulnerability affects Calibre-Web up to version 0.6.21 [2]. As of the CVE publication date (2024-07-19), no patch is mentioned in the references [1][2][3]. Users should monitor the official GitHub repository for updates and consider limiting write access to trusted users as a workaround [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
calibrewebPyPI | >= 0.6.0, <= 0.6.21 | — |
Affected products
2- janeczku/Calibre-Webdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.