Home

Description

Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink, and -HardLink. This is a bypass of the incomplete key-sanitization fix introduced in v8.30.1. An unauthenticated attacker can rename or move any PDF being processed to an arbitrary path in the container filesystem, overwrite arbitrary files, or create symlinks and hard links at arbitrary paths.

PUBLISHED Reserved 2026-04-10 | Published 2026-05-06 | Updated 2026-05-07 | Assigner GitHub_M




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

Problem types

CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Product status

<= 8.30.1
affected

References

github.com/...enberg/security/advisories/GHSA-q7r4-hc83-hf2q exploit

github.com/...enberg/security/advisories/GHSA-q7r4-hc83-hf2q

github.com/...ommit/405f1069c026bb08f319fb5a44e5c67c33208318

cve.org (CVE-2026-40281)

nvd.nist.gov (CVE-2026-40281)

Download JSON