Autocaliweb is a web app that offers an interface for browsing, reading, and downloading eBooks using a valid Calibre database. Prior to version 0.8.3, the debug pack generated by Autocaliweb can expose sensitive configuration data, including API keys. This occurs because the to_dict() method, used to serialize configuration for the debug pack, doesn't adequately filter out sensitive fields such as API tokens. Users, unaware of the full contents, might share these debug packs, inadvertently leaking their private API keys. This issue has been patched in version 0.8.3.
History

Thu, 14 Aug 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Autocaliweb Project
Autocaliweb Project autocaliweb
Vendors & Products Autocaliweb Project
Autocaliweb Project autocaliweb

Wed, 13 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description Autocaliweb is a web app that offers an interface for browsing, reading, and downloading eBooks using a valid Calibre database. Prior to version 0.8.3, the debug pack generated by Autocaliweb can expose sensitive configuration data, including API keys. This occurs because the to_dict() method, used to serialize configuration for the debug pack, doesn't adequately filter out sensitive fields such as API tokens. Users, unaware of the full contents, might share these debug packs, inadvertently leaking their private API keys. This issue has been patched in version 0.8.3.
Title Autocaliweb Exposure of Sensitive Information to an Unauthorized Actor in `config_sql.py`
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-08-13T20:01:53.112Z

Reserved: 2025-08-07T18:27:23.307Z

Link: CVE-2025-55165

cve-icon Vulnrichment

Updated: 2025-08-13T17:44:28.234Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-12T21:15:43.320

Modified: 2025-08-13T20:15:32.633

Link: CVE-2025-55165

cve-icon Redhat

No data.