Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-30853

Опубликовано: 13 мар. 2026
Источник: redhat
CVSS3: 5
EPSS Низкий

Описание

A flaw was found in Calibre, an e-book manager. A path traversal vulnerability in the RocketBook (.rb) input plugin allows an attacker to write arbitrary files to any location accessible by the Calibre process. This can be exploited when a user opens or converts a specially crafted .rb file, potentially leading to information disclosure, denial of service, or arbitrary code execution.

Отчет

This vulnerability has a MODERATE impact. A path traversal flaw in the RocketBook (.rb) input plugin of calibre allows an attacker to write arbitrary files to locations writable by the calibre process. This issue occurs when a user opens or converts a specially crafted .rb file.

Меры по смягчению последствий

To mitigate this issue, users should avoid opening or converting untrusted RocketBook (.rb) files with calibre. Processing untrusted files can lead to arbitrary file writes on the system.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2447437calibre: Calibre: Arbitrary file write via crafted RocketBook (.rb) file

EPSS

Процентиль: 2%
0.00013
Низкий

5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5
ubuntu
14 дней назад

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to 9.5.0, a path traversal vulnerability in the RocketBook (.rb) input plugin (src/calibre/ebooks/rb/reader.py) allows an attacker to write arbitrary files to any path writable by the calibre process when a user opens or converts a crafted .rb file. This is the same bug class fixed in CVE-2026-26065 for the PDB readers, but the fix was never applied to the RB reader. This vulnerability is fixed in 9.5.0.

CVSS3: 5
nvd
14 дней назад

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to 9.5.0, a path traversal vulnerability in the RocketBook (.rb) input plugin (src/calibre/ebooks/rb/reader.py) allows an attacker to write arbitrary files to any path writable by the calibre process when a user opens or converts a crafted .rb file. This is the same bug class fixed in CVE-2026-26065 for the PDB readers, but the fix was never applied to the RB reader. This vulnerability is fixed in 9.5.0.

CVSS3: 5
debian
14 дней назад

calibre is a cross-platform e-book manager for viewing, converting, ed ...

EPSS

Процентиль: 2%
0.00013
Низкий

5 Medium

CVSS3