Home

Description

Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the POST /api/backups/upload endpoint decompresses the details entry from an uploaded .audiobookshelf ZIP file entirely into memory using zip.entryData(), with no limit on the decompressed size. The upload middleware also has no file size limit. An admin user can upload a crafted ZIP containing a highly compressed details entry that, when decompressed, consumes hundreds of megabytes or gigabytes of memory, crashing the server process via out-of-memory. This vulnerability is fixed in 2.32.2.

PUBLISHED Reserved 2026-04-30 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




MEDIUM: 4.9CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-409: Improper Handling of Highly Compressed Data (Data Amplification)

Product status

< 2.33.2
affected

References

github.com/...kshelf/security/advisories/GHSA-4jq4-rvq8-j26h

cve.org (CVE-2026-42886)

nvd.nist.gov (CVE-2026-42886)

Download JSON