{"id":"CVE-2024-6781","summary":"Calibre Arbitrary File Read","details":"Path traversal in Calibre \u003c= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.","modified":"2026-05-18T05:59:06.542671072Z","published":"2024-08-06T03:38:45.309Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6781.json","cna_assigner":"STAR_Labs","cwe_ids":["CWE-22"]},"references":[{"type":"WEB","url":"https://github.com/kovidgoyal/calibre/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/6xxx/CVE-2024-6781.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6781"},{"type":"ADVISORY","url":"https://starlabs.sg/advisories/24/24-6781/"},{"type":"FIX","url":"https://github.com/kovidgoyal/calibre/commit/bcd0ab12c41a887f8290a9b56e46c3a29038d9c4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kovidgoyal/calibre","events":[{"introduced":"0"},{"fixed":"bcd0ab12c41a887f8290a9b56e46c3a29038d9c4"}]}],"versions":["v7.15.0","v7.14.0","v7.13.0","v7.12.0","v7.11.0","v7.10.0","v7.9.0","v7.8.0","v7.7.0","v7.6.0","v7.5.1","v7.5.0","v7.4.0","v7.3.0","v7.2.0","v7.1.0","v7.0.0","v6.29.0","v6.28.1","v6.28.0","v6.27.0","v6.26.0","v6.25.0","v6.24.0","v6.23.0","v6.22.0","v6.21.0","v6.20.0","v6.19.1","v6.19.0","v6.18.1","v6.18.0","v6.17.0","v6.16.0","v6.15.1","v6.15.0","v6.14.1","v6.14.0","v6.13.0","v6.12.0","v6.11.0","v6.10.0","v6.9.0","v6.8.0","v6.7.1","v6.7.0","v6.6.1","v6.6.0","v6.5.0","v6.4.0","v6.3.0","v6.2.1","v6.2.0","v6.1.0","v6.0.0","v5.44.0","v5.43.0","v5.42.0","v5.41.0","v5.40.0","v5.39.1","v5.39.0","v5.38.0","v5.37.0","v5.36.0","v5.35.0","v5.34.0","v5.33.2","v5.33.1","v5.33.0","v5.32.0","v5.31.1","v5.31.0","v5.30.0","v5.29.0","v5.28.0","v5.27.0","v5.26.0","v5.25.0","v5.24.0","v5.23.0","v5.22.1","v5.22.0","v5.21.0","v5.20.0","v5.19.0","v5.18.0","v5.17.0","v5.16.1","v5.16.0","v5.15.0","v5.14.0","v5.13.0","v5.12.0","v5.11.0","v5.10.1","v5.10.0","v5.9.0","v5.8.1","v5.8.0","v5.7.2","v5.7.1","v5.7.0","v5.6.0","v5.5.0","v5.4.2","v5.4.1","v5.4.0","v5.3.0","v5.2.0","v5.1.0","v5.0.1","v5.0.0","v4.99.17","v4.23.0","v4.22.0","v4.21.0","v4.20.0","v4.19.0","v4.18.0","v4.17.0","v4.16.0","v4.15.0","v4.14.0","v4.13.0","v4.12.0","v4.11.2","v4.11.1","v4.11.0","v4.10.1","v4.10.0","v4.9.1","v4.9.0","v4.8.0","v4.7.0","v4.6.0","v4.5.0","v4.4.0","v4.3.0","v4.2.0","v4.1.0","v4.0.0","v3.48.0","v3.47.0","v3.46.0","v3.45.2","v3.45.1","v3.45.0","v3.44.0","v3.43.0","v3.42.0","v3.41.3","v3.41.2","v3.41.1","v3.41.0","v3.40.1","v3.40.0","v3.39.1","v3.39.0","v3.38.1","v3.38.0","v3.37.0","v3.36.0","v3.35.0","v3.34.0","v3.33.1","v3.33.0","v3.32.0","v3.31.0","v3.30.0","v3.29.0","v3.28.0","v3.27.1","v3.27.0","v3.26.1","v3.26.0","v3.25.0","v3.24.2","v3.24.1","v3.24.0","v3.23.0","v3.22.1","v3.22.0","v3.21.0","v3.20.0","v3.19.0","v3.18.0","v3.17.0","v3.16.0","v3.15.0","v3.14.0","v3.13.0","v3.12.0","v3.11.1","v3.11.0","v3.10.0","v3.9.0","v3.8.0","v3.7.0","v3.6.0","v3.5.0","v3.4.0","v3.3.0","v3.2.1","v3.2.0","v3.1.1","v3.1.0","v3.0.0","v2.85.1","v2.85.0","v2.84.0","v2.83.0","v2.82.0","v2.81.0","v2.80.0","v2.79.1","v2.79.0","v2.78.0","v2.77.0","v2.76.0","v2.75.1","v2.75.0","v2.74.0","v2.73.0","v2.72.0","v2.71.0","v2.70.0","v2.69.0","v2.68.0","v2.67.0","v2.66.0","v2.65.1","v2.65.0","v2.64.0","v2.63.0","v2.62.0","v2.61.0","v2.60.0","v2.59.0","v2.58.0","v2.57.1","v2.57.0","v2.56.0","v2.55.0","v2.54.0","v2.53.0","v2.52.0","v2.51.0","v2.50.1","v2.50.0","v2.49.0","v2.48.0","v2.47.0","v2.46.0","v2.45.0","v2.44.1","v2.44.0","v2.43.0","v2.42.0","v2.41.0","v2.40.0","v2.39.0","v2.38.0","v2.37.1","v2.37.0","v2.36.0","v2.35.0","v2.34.0","v2.33.0","v2.32.1","v2.32.0","v2.31.0","v2.30.0","v2.29.0","v2.28.0","v2.27.0","v2.26.0","v2.25.0","v2.24.0","v2.23.0","v2.22.0","v2.21.0","v2.20.0","v2.19.0","v2.18.0","v2.17.0","v2.16.0","v2.15.0","v2.14.0","v2.13.0","v2.12.0","v2.11.0","v2.10.0","v2.9.0","v2.8.0","v2.7.0","v2.6.0","v2.5.0","v2.4.0","v2.3.0","v2.2.0","v2.1.0","v2.0.0","v1.48.0","v1.47.0","v1.46.0","v1.45.0","v1.44.0","v1.43.0","v1.42.0","v1.41.0","v1.40.0","v1.39.0","v1.38.0","v1.37.0","v1.36.0","v1.35.0","v1.34.0","v1.33.0","v1.32.0","v1.31.0","v1.30.0","v1.29.0","v1.28.0","v1.27.0","v1.26.0","v1.25.0","v1.24.0","v1.23.0","v1.22.0","v1.21.0","v1.20.0","v1.19.0","v1.18.0","v1.17.0","v1.16.0","v1.15.0","v1.14.0","v1.13.0","v1.12.0","v1.11.0","v1.10.0","v1.9.0","v1.8.0","v1.7.0","v1.5.0","v1.6.0","v1.4.0","v1.3.0","v1.2.0","v1.1.0","v1.0.0","v0.9.44","v0.9.43","v0.9.42","v0.9.41","v0.9.40","v0.9.39","v0.9.38","0.9.37","0.9.36","0.9.35","0.9.34","0.9.33"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-6781.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}