### [CVE-2021-25964](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25964) ![](https://img.shields.io/static/v1?label=Product&message=calibreweb&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200.6.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen) ### Description In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered. ### POC #### Reference - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25964 #### Github No PoCs found on GitHub currently.