Bug 2452276 (CVE-2026-33206) - CVE-2026-33206 calibre: path traversal allows reading arbitrary files when converting a text-based file
Summary: CVE-2026-33206 calibre: path traversal allows reading arbitrary files when co...
Keywords:
Status: NEW
Alias: CVE-2026-33206
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2452380
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-27 15:02 UTC by OSIDB Bzimport
Modified: 2026-03-27 18:31 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-27 15:02:47 UTC
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix.


Note You need to log in before you can comment on or make changes to this bug.