Skip to content
CVSS 10.0CVSS 10.0 · CRITICAL

CVE-2026-40281

Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink, and -HardLink. This is a bypass of the incomplete key-sanitization fix introduced in v8.30.1. An unauthenticated attacker can rename or move any PDF being processed to an arbitrary path in the container filesystem, overwrite arbitrary files, or create symlinks and hard links at arbitrary paths.

Ver en NVD

Análisis

Gotenberg versions 8.30.1 and earlier are vulnerable to a critical argument injection flaw in the metadata write endpoint. An unauthenticated attacker can provide crafted metadata values containing newline characters to overwrite, move, or link files within the container filesystem.

Severidad

Puntaje: 10.0(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: CHANGED
C: NONE
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-88

EPSS

Probabilidad de explotación (próx. 30 días): 0.0009 (0.1%)
Percentil: 24.8%
EPSS: 2026-05-07

Descripción técnica

Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink, and -HardLink. This is a bypass of the incomplete key-sanitization fix introduced in v8.30.1. An unauthenticated attacker can rename or move any PDF being processed to an arbitrary path in the container filesystem, overwrite arbitrary files, or create symlinks and hard links at arbitrary paths.

Publicada: 6/5/2026, 21:16:01
Última modificación: 7/5/2026, 14:58:29

Referencias

InicioEventosBlogRecursosEquipo