CVE-2026-27824

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*

History

04 Mar 2026, 16:39

Type Values Removed Values Added
References () https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vhxc-r7v8-2xrw - () https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vhxc-r7v8-2xrw - Exploit, Vendor Advisory
First Time Calibre-ebook calibre
Calibre-ebook
CPE cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*

27 Feb 2026, 20:21

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 20:21

Updated : 2026-03-04 16:39


NVD link : CVE-2026-27824

Mitre link : CVE-2026-27824

CVE.ORG link : CVE-2026-27824


JSON object : View

Products Affected

calibre-ebook

  • calibre
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts

CWE-346

Origin Validation Error