Home

Description

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue.

PUBLISHED Reserved 2026-02-24 | Published 2026-02-27 | Updated 2026-03-02 | Assigner GitHub_M




MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

Product status

< 9.4.0
affected

References

github.com/...alibre/security/advisories/GHSA-5fpj-fxw7-8grw

cve.org (CVE-2026-27810)

nvd.nist.gov (CVE-2026-27810)

Download JSON