BookLore is a self-hosted web app for organizing and managing personal book collections. In versions 1.8.1 and prior, an authentication bypass vulnerability in the BookMediaController allows any unauthenticated user to access and download book covers, thumbnails, and complete PDF/CBX page content without authorization. The vulnerability exists because multiple media endpoints lack proper access control annotations, and the CoverJwtFilter continues request processing even when no authentication token is provided. This enables attackers to enumerate and exfiltrate all book content from the system, bypassing the intended download permissions (canDownload) entirely. This issue has been patched via commit b226c43.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Oct 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 23 Oct 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Booklore
Booklore booklore |
|
Vendors & Products |
Booklore
Booklore booklore |
Wed, 22 Oct 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | BookLore is a self-hosted web app for organizing and managing personal book collections. In versions 1.8.1 and prior, an authentication bypass vulnerability in the BookMediaController allows any unauthenticated user to access and download book covers, thumbnails, and complete PDF/CBX page content without authorization. The vulnerability exists because multiple media endpoints lack proper access control annotations, and the CoverJwtFilter continues request processing even when no authentication token is provided. This enables attackers to enumerate and exfiltrate all book content from the system, bypassing the intended download permissions (canDownload) entirely. This issue has been patched via commit b226c43. | |
Title | BookLore Media API Authentication Bypass | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-23T16:32:27.787Z
Reserved: 2025-10-16T19:24:37.269Z
Link: CVE-2025-62614

Updated: 2025-10-23T16:32:19.388Z

Status : Received
Published: 2025-10-22T21:15:46.983
Modified: 2025-10-22T21:15:46.983
Link: CVE-2025-62614

No data.