Home

Description

Autocaliweb is a web app that offers an interface for browsing, reading, and downloading eBooks using a valid Calibre database. Prior to version 0.8.3, the debug pack generated by Autocaliweb can expose sensitive configuration data, including API keys. This occurs because the to_dict() method, used to serialize configuration for the debug pack, doesn't adequately filter out sensitive fields such as API tokens. Users, unaware of the full contents, might share these debug packs, inadvertently leaking their private API keys. This issue has been patched in version 0.8.3.

PUBLISHED Reserved 2025-08-07 | Published 2025-08-12 | Updated 2025-08-13 | Assigner GitHub_M




HIGH: 8.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 0.8.3
affected

References

github.com/...aliweb/security/advisories/GHSA-44vp-wgh9-9535

github.com/...ommit/f455051f7c758ae8490186718b73e449f353b702

github.com/gelbphoenix/autocaliweb/releases/tag/v0.8.3

cve.org (CVE-2025-55165)

nvd.nist.gov (CVE-2025-55165)

Download JSON