Calibre Web 0.6.24 & Autocaliweb 0.7.0 - Blind C
Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Calibre Web, Autocaliweb allows Blind OS Command Injection.This issue affects Calibre Web: 0.6.24 (Nicolette); Autocaliweb: from 0.7.0 before 0.7.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Blind OS command injection in Calibre Web 0.6.24 and Autocaliweb <0.7.1 allows an admin to execute arbitrary binaries by providing a path to the config_rarfile_location parameter.
CVE-2025-7404 describes a blind OS command injection vulnerability in Calibre Web version 0.6.24 (Nicolette) and Autocaliweb versions from 0.7.0 before 0.7.1. The root cause is that the /admin/ajaxconfig endpoint accepts user-supplied input for the config_rarfile_location parameter without proper validation. This path is then passed to the check_unrar() helper function, which directly uses it in a subprocess call via process_wait() and process_open(), allowing arbitrary binary execution [1][4].
Exploitation
An attacker must be authenticated as an administrator to reach the vulnerable endpoint. By sending a POST request with a malicious path (e.g., /sbin/reboot or /bin/bash), the server will execute the binary without any arguments. While arguments cannot be appended, the binary runs with the full privileges of the server process, leading to immediate system impact. This is a blind injection because the output of the command is not returned to the attacker [4].
Impact
A successful attack achieves arbitrary code execution at the server level. Although exfiltration of data is limited due to the lack of output, an attacker can trigger system commands like rebooting the server, launching interactive shells (if a terminal is attached), or running any other available binary. This compromises system integrity and availability, and severely impacts overall security [1][4].
Mitigation
For Calibre Web, upgrading to a patched version (later than 0.6.24) is recommended. For Autocaliweb, users should upgrade to version 0.7.1 or later. Both projects have addressed the vulnerability by implementing proper input validation and sanitization of the config_rarfile_location parameter. No workarounds are documented, and no CISA KEV listing has been observed as of publication date [2][3][4].
- NVD - CVE-2025-7404
- GitHub - gelbphoenix/autocaliweb: (MOVED TO CODEBERG) Web managing platform for eBooks, eComics and PDFs
- GitHub - janeczku/calibre-web: :books: Web app for browsing, reading and downloading eBooks stored in a Calibre database
- Calibre Web 0.6.24 - Blind Command Injection | Fluid Attacks
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
calibrewebPyPI | <= 0.6.24 | — |
Affected products
2- Autocaliweb/Autocaliwebv5Range: 0.7.0
- Calibre Web/Calibre Webv5Range: 0.6.24
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- fluidattacks.com/advisories/kinoghsathird-party-advisoryWEB
- github.com/advisories/GHSA-qc4j-v7h6-xr5hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-7404ghsaADVISORY
News mentions
0No linked articles in our index yet.