CVE-2026-26065
📋 TL;DR
CVE-2026-26065 is a path traversal vulnerability in calibre's PDB readers that allows attackers to write arbitrary files anywhere the user has write permissions. This can lead to code execution, denial of service through file corruption, or system compromise. Users of calibre versions 9.2.1 and below are affected.
💻 Affected Systems
- calibre
📦 What is this software?
Calibre by Calibre Ebook
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or ransomware deployment.
Likely Case
Local privilege escalation, file corruption causing denial of service, or malicious file writes in user directories.
If Mitigated
Limited to user-writable directories without privilege escalation, causing data loss or application disruption.
🎯 Exploit Status
Exploitation requires user to open a malicious PDB file. No authentication bypass needed beyond file access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.3.0
Vendor Advisory: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vmfh-7mr7-pp2w
Restart Required: Yes
Instructions:
1. Download calibre 9.3.0 or later from calibre-ebook.com. 2. Run the installer. 3. Restart calibre and any related services.
🔧 Temporary Workarounds
Disable PDB file processing
allPrevent calibre from processing PDB files by removing or disabling the PDB reader plugin.
# On Linux/macOS: mv ~/.config/calibre/plugins/pdb_reader.py ~/.config/calibre/plugins/pdb_reader.py.disabled
# On Windows: Move %APPDATA%\calibre\plugins\pdb_reader.py to a backup location
🧯 If You Can't Patch
- Restrict user write permissions to sensitive directories using file system ACLs.
- Implement application whitelisting to prevent execution of unauthorized binaries from user-writable locations.
🔍 How to Verify
Check if Vulnerable:
Check calibre version via Help → About in GUI or 'calibre --version' in terminal. If version is 9.2.1 or below, system is vulnerable.
Check Version:
calibre --version
Verify Fix Applied:
Verify version is 9.3.0 or higher. Test with a safe PDB file to ensure application functions normally.
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations in user directories
- Multiple PDB file processing errors
Network Indicators:
- None - this is a local file processing vulnerability
SIEM Query:
Process:calibre AND (FileWrite:*\..* OR FileWrite:*\..*\..*)