CVE-2025-64486

N/A Unknown

📋 TL;DR

This vulnerability in calibre e-book manager allows attackers to write arbitrary files to the filesystem when processing malicious FB2 (FictionBook) files. This can lead to arbitrary code execution on affected systems. Users running calibre versions 8.13.0 and earlier are vulnerable when viewing or converting untrusted FB2 files.

💻 Affected Systems

Products:
  • calibre
Versions: 8.13.0 and prior
Operating Systems: All platforms where calibre runs (Windows, Linux, macOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when viewing or converting FB2 files. Default installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local file system corruption, data loss, or limited code execution in user context when processing malicious FB2 files from untrusted sources.

🟢

If Mitigated

No impact if proper file validation is implemented or if only trusted FB2 files are processed.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction to open a malicious FB2 file. No authentication needed once file is processed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.14.0

Vendor Advisory: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-hpwq-c98h-xp8g

Restart Required: No

Instructions:

1. Update calibre to version 8.14.0 or later. 2. On Linux/macOS: Use package manager or 'calibre --update'. 3. On Windows: Download latest installer from calibre-ebook.com. 4. Verify version with 'calibre --version'.

🔧 Temporary Workarounds

Disable FB2 file processing

all

Prevent calibre from processing FB2 files by removing or disabling FB2 support

# No simple command available - requires modifying calibre configuration or removing FB2 plugin

Use sandboxed environment

linux

Run calibre in isolated container or virtual machine when processing untrusted files

docker run --rm -v /path/to/books:/books linuxserver/calibre
# Example using Docker container

🧯 If You Can't Patch

  • Avoid opening FB2 files from untrusted sources in calibre
  • Use alternative software for FB2 file processing until patched

🔍 How to Verify

Check if Vulnerable:

Check calibre version with 'calibre --version'. If version is 8.13.0 or earlier, system is vulnerable.

Check Version:

calibre --version

Verify Fix Applied:

After updating, verify version is 8.14.0 or later with 'calibre --version'.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations during FB2 processing
  • Multiple failed file validation attempts

Network Indicators:

  • Download of FB2 files from untrusted sources followed by calibre process activity

SIEM Query:

process_name:"calibre" AND (file_write:* OR process_create:*) AND file_extension:".fb2"

🔗 References

📤 Share & Export