Description

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue.

INFO

Published Date :

2026-02-27T19:46:07.612Z

Last Modified :

2026-03-02T12:54:32.182Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-27824 vulnerability.

Vendors Products
Calibre-ebook
  • Calibre
Kovidgoyal
  • Calibre
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-27824.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact