CVE Alert: CVE-2025-55165

Vulnerability Summary: CVE-2025-55165
Autocaliweb is a web app that offers an interface for browsing, reading, and downloading eBooks using a valid Calibre database. Prior to version 0.8.3, the debug pack generated by Autocaliweb can expose sensitive configuration data, including API keys. This occurs because the to_dict() method, used to serialize configuration for the debug pack, doesn’t adequately filter out sensitive fields such as API tokens. Users, unaware of the full contents, might share these debug packs, inadvertently leaking their private API keys. This issue has been patched in version 0.8.3.
Affected Endpoints:
No affected endpoints listed.
Published Date:
8/12/2025, 9:15:43 PM
🔥 CVSS Score:
Exploit Status:
Not ExploitedReferences:
- https://github.com/gelbphoenix/autocaliweb/commit/f455051f7c758ae8490186718b73e449f353b702
- https://github.com/gelbphoenix/autocaliweb/releases/tag/v0.8.3
- https://github.com/gelbphoenix/autocaliweb/security/advisories/GHSA-44vp-wgh9-9535
Recommended Action:
No proposed action available. Please refer to vendor documentation for updates.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.