CVE-2026-27810

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*

History

04 Mar 2026, 16:40

Type Values Removed Values Added
First Time Calibre-ebook calibre
Calibre-ebook
References () https://github.com/kovidgoyal/calibre/security/advisories/GHSA-5fpj-fxw7-8grw - () https://github.com/kovidgoyal/calibre/security/advisories/GHSA-5fpj-fxw7-8grw - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*

27 Feb 2026, 20:21

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 20:21

Updated : 2026-03-04 16:40


NVD link : CVE-2026-27810

Mitre link : CVE-2026-27810

CVE.ORG link : CVE-2026-27810


JSON object : View

Products Affected

calibre-ebook

  • calibre
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')