calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0.
History

Fri, 06 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Description calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0.
Title calibre has a Path Traversal Leading to Arbitrary File Corruption and Code Execution
Weaknesses CWE-22
CWE-73
CWE-94
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-06T20:07:40.529Z

Reserved: 2026-02-04T05:15:41.790Z

Link: CVE-2026-25636

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-06T21:16:18.833

Modified: 2026-02-06T21:16:18.833

Link: CVE-2026-25636

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.