Unrated severityNVD Advisory· Published Feb 20, 2026· Updated Feb 20, 2026
calibre: Path Traversal can Lead to Arbitrary File Write and Potential Code Execution
CVE-2026-26065
Description
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0.
Affected products
2- Range: <=9.2.1
- kovidgoyal/calibrev5Range: < 9.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/kovidgoyal/calibre/commit/b6da1c3878c06eb1356cb0ec1106cb66e0e9bfb8mitrex_refsource_MISC
- github.com/kovidgoyal/calibre/security/advisories/GHSA-vmfh-7mr7-pp2wmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.