Kovid Goyal

12 exploits Active since Mar 2018
CVE-2026-26064 WRITEUP HIGH WRITEUP
calibre <=9.2.1 - Path Traversal
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Function extract_pictures only checks startswith('Pictures'), and does not sanitize '..' sequences. calibre's own ZipFile.extractall() in utils/zipfile.py does sanitize '..' via _get_targetpath(), but extract_pictures() bypasses this by using manual zf.read() + open(). This issue has been fixed in version 9.3.0.
CVSS 8.8
CVE-2026-26065 WRITEUP HIGH WRITEUP
calibre <=9.2.1 - Path Traversal
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0.
CVSS 8.8
CVE-2018-7889 WRITEUP HIGH WRITEUP
Calibre <3.18 - RCE
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
CVSS 7.8
CVE-2020-35605 WRITEUP CRITICAL WRITEUP
kitty <0.19.3 - RCE
The Graphics Protocol feature in graphics.c in kitty before 0.19.3 allows remote attackers to execute arbitrary code because a filename containing special characters can be included in an error message.
CVSS 9.8
CVE-2021-32837 WRITEUP HIGH WRITEUP
mechanize <0.4.6 - ReDoS
mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.
CVSS 7.5
CVE-2022-41322 WRITEUP HIGH WRITEUP
Kitty <0.26.2 - RCE
In Kitty before 0.26.2, insufficient validation in the desktop notification escape sequence can lead to arbitrary code execution. The user must display attacker-controlled content in the terminal, then click on a notification popup.
CVSS 7.8
CVE-2024-6781 WRITEUP HIGH WRITEUP
Calibre <= 7.14.0 - Path Traversal
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
CVSS 7.5
CVE-2024-7008 WRITEUP MEDIUM WRITEUP
Calibre < 7.15.0 - XSS
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting.
CVSS 5.4
CVE-2024-7009 WRITEUP MEDIUM WRITEUP
Calibre < 7.15.0 - SQL Injection
Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text searches to achieve SQL injection on the SQLite database.
CVSS 4.2
CVE-2025-64486 WRITEUP CRITICAL WRITEUP
calibre <8.13.0 - Code Injection
calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0.
CVE-2026-25635 WRITEUP HIGH WRITEUP
Calibre <9.2.0 - Path Traversal
calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows (haven't tested on other OS's), this can lead to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. This vulnerability is fixed in 9.2.0.
CVSS 8.6
CVE-2026-25636 WRITEUP HIGH WRITEUP
Calibre <9.1.0 - Path Traversal
calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPUB conversion allows a malicious EPUB file to corrupt arbitrary existing files writable by the Calibre process. During conversion, Calibre resolves CipherReference URI from META-INF/encryption.xml to an absolute filesystem path and opens it in read-write mode, even when it points outside the conversion extraction directory. This vulnerability is fixed in 9.2.0.
CVSS 8.2