Unrated severityNVD Advisory· Published Feb 6, 2026· Updated Feb 11, 2026
calibre has a Path Traversal Leading to Arbitrary File Corruption and Code Execution
CVE-2026-25636
Description
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0.
Affected products
2- Range: <=9.1.0
- kovidgoyal/calibrev5Range: < 9.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/kovidgoyal/calibre/commit/9484ea82c6ab226c18e6ca5aa000fa16de598726mitrex_refsource_MISC
- github.com/kovidgoyal/calibre/security/advisories/GHSA-8r26-m7j5-hm29mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.