CVE-2026-33206 Overview
CVE-2026-33206 is a path traversal vulnerability in Calibre, the popular cross-platform e-book manager used for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre's handling of images in Markdown and other similar text-based files, allowing an attacker to include arbitrary files from the file system into converted books. Additionally, missing authentication and server-side request forgery (SSRF) in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction.
Critical Impact
Attackers can exploit this vulnerability to read arbitrary files from the file system and exfiltrate sensitive data through the unauthenticated SSRF vulnerability in the ebook reader web view, potentially exposing credentials, configuration files, and other sensitive information.
Affected Products
- calibre-ebook calibre versions prior to 9.6.0
- Calibre content server web view component
- Calibre e-book conversion functionality
Discovery Timeline
- 2026-03-27 - CVE-2026-33206 published to NVD
- 2026-03-30 - Last updated in NVD database
Technical Details for CVE-2026-33206
Vulnerability Analysis
This vulnerability combines two distinct security weaknesses to create an impactful attack chain. The first issue is a path traversal vulnerability (CWE-23: Relative Path Traversal) in how Calibre processes images referenced in Markdown and similar text-based file formats during e-book conversion. An attacker can craft malicious image references containing directory traversal sequences to include arbitrary files from the target system's file system into the converted book output.
The second component is an SSRF vulnerability coupled with missing authentication in the background-image endpoint of the ebook reader web view. This endpoint can be leveraged to exfiltrate the files accessed through the path traversal without requiring additional user interaction, making the attack chain particularly dangerous.
The local attack vector requires user interaction—specifically, the victim must open or convert a maliciously crafted e-book file. However, once triggered, the vulnerability allows access to sensitive files outside the intended scope with no integrity or availability impact, focusing purely on confidentiality breach.
Root Cause
The root cause lies in insufficient input validation when processing image paths in Markdown and similar text-based file formats. The application fails to properly sanitize or validate file paths before including them in the conversion process, allowing directory traversal sequences (such as ../) to escape the intended directory scope. The background-image endpoint in the web view component compounds this issue by lacking proper authentication controls, enabling unauthorized access to resources.
Attack Vector
The attack requires local access and involves the following chain:
- An attacker crafts a malicious Markdown file or similar text-based e-book source containing specially crafted image references with path traversal sequences
- The victim opens or converts the malicious file using Calibre
- During conversion, Calibre processes the path traversal payloads and includes arbitrary files from the file system into the converted book
- The unauthenticated background-image endpoint in the ebook reader web view can then be exploited to exfiltrate the included files without additional user interaction
The vulnerability specifically targets the image handling functionality in the conversion pipeline. When Calibre encounters an image reference in Markdown content, it attempts to resolve and include that image. By crafting malicious paths such as ../../etc/passwd or similar traversal sequences, attackers can break out of the intended directory and access sensitive system files.
Detection Methods for CVE-2026-33206
Indicators of Compromise
- Unusual file access patterns originating from the Calibre process, particularly reads of sensitive system files like /etc/passwd, SSH keys, or configuration files
- Unexpected network requests from the Calibre content server to internal resources
- E-book files containing suspicious path traversal patterns in image references (sequences like ../, ..%2f, or similar encoded variants)
Detection Strategies
- Monitor file system access by the Calibre process for reads outside of expected library and cache directories
- Inspect incoming e-book files for path traversal sequences in Markdown image references before processing
- Implement network traffic analysis to detect unusual outbound requests from the Calibre web view component
Monitoring Recommendations
- Enable detailed logging for Calibre's content server and conversion processes
- Deploy endpoint detection rules to alert on Calibre processes accessing sensitive system directories
- Monitor for connections to the Calibre web server from unexpected network sources
How to Mitigate CVE-2026-33206
Immediate Actions Required
- Upgrade Calibre to version 9.6.0 or later immediately
- Disable the Calibre content server web view if not actively required until patching is complete
- Review recently processed e-book files for suspicious path traversal patterns in image references
- Audit systems for potential unauthorized file access if vulnerable versions were in use
Patch Information
Version 9.6.0 of Calibre contains a fix for this vulnerability. Users should update to this version or later to remediate the path traversal and SSRF issues. The security advisory with additional details is available in the GitHub Security Advisory GHSA-h3p4-m74f-43g6.
Workarounds
- Avoid opening or converting e-book files from untrusted sources until the patch is applied
- Disable the Calibre content server (calibre-server) to prevent exploitation of the SSRF component
- Run Calibre in a sandboxed environment with limited file system access
- Implement network segmentation to restrict the Calibre web view from making arbitrary internal requests
# Disable Calibre content server until patching
# Stop any running calibre-server instances
pkill calibre-server
# Verify Calibre version after upgrade
calibre --version
# Should show version 9.6.0 or higher
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


