VYPR
Moderate severityNVD Advisory· Published Jul 24, 2025· Updated Jul 25, 2025

Calibre Web 0.6.24 & Autocaliweb 0.7.0 - Blind C

CVE-2025-7404

Description

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Calibre Web, Autocaliweb allows Blind OS Command Injection.This issue affects Calibre Web: 0.6.24 (Nicolette); Autocaliweb: from 0.7.0 before 0.7.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Blind OS command injection in Calibre Web 0.6.24 and Autocaliweb <0.7.1 allows an admin to execute arbitrary binaries by providing a path to the config_rarfile_location parameter.

CVE-2025-7404 describes a blind OS command injection vulnerability in Calibre Web version 0.6.24 (Nicolette) and Autocaliweb versions from 0.7.0 before 0.7.1. The root cause is that the /admin/ajaxconfig endpoint accepts user-supplied input for the config_rarfile_location parameter without proper validation. This path is then passed to the check_unrar() helper function, which directly uses it in a subprocess call via process_wait() and process_open(), allowing arbitrary binary execution [1][4].

Exploitation

An attacker must be authenticated as an administrator to reach the vulnerable endpoint. By sending a POST request with a malicious path (e.g., /sbin/reboot or /bin/bash), the server will execute the binary without any arguments. While arguments cannot be appended, the binary runs with the full privileges of the server process, leading to immediate system impact. This is a blind injection because the output of the command is not returned to the attacker [4].

Impact

A successful attack achieves arbitrary code execution at the server level. Although exfiltration of data is limited due to the lack of output, an attacker can trigger system commands like rebooting the server, launching interactive shells (if a terminal is attached), or running any other available binary. This compromises system integrity and availability, and severely impacts overall security [1][4].

Mitigation

For Calibre Web, upgrading to a patched version (later than 0.6.24) is recommended. For Autocaliweb, users should upgrade to version 0.7.1 or later. Both projects have addressed the vulnerability by implementing proper input validation and sanitization of the config_rarfile_location parameter. No workarounds are documented, and no CISA KEV listing has been observed as of publication date [2][3][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
calibrewebPyPI
<= 0.6.24

Affected products

2
  • Autocaliweb/Autocaliwebv5
    Range: 0.7.0
  • Calibre Web/Calibre Webv5
    Range: 0.6.24

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.