No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advplyr
Advplyr audiobookshelf |
|
| Vendors & Products |
Advplyr
Advplyr audiobookshelf |
Mon, 11 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.32.2, the POST /api/backups/upload endpoint decompresses the details entry from an uploaded .audiobookshelf ZIP file entirely into memory using zip.entryData(), with no limit on the decompressed size. The upload middleware also has no file size limit. An admin user can upload a crafted ZIP containing a highly compressed details entry that, when decompressed, consumes hundreds of megabytes or gigabytes of memory, crashing the server process via out-of-memory. This vulnerability is fixed in 2.32.2. | |
| Title | Audiobookshelf: Memory amplification DoS via oversized compressed details entry in backup upload | |
| Weaknesses | CWE-409 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T12:57:50.120Z
Reserved: 2026-04-30T18:49:06.712Z
Link: CVE-2026-42886
Updated: 2026-05-12T12:57:42.653Z
Status : Deferred
Published: 2026-05-11T20:25:45.020
Modified: 2026-05-12T14:50:18.527
Link: CVE-2026-42886
No data.
OpenCVE Enrichment
Updated: 2026-05-11T23:15:09Z