Home

Description

Gotenberg is a Docker-powered stateless API for PDF files. Prior to 8.32.0, FilterOutboundURL resolves the hostname, checks the resolved IPs against the private-address deny-list, and returns only the error. It discards the resolved addresses. Chromium later performs its own DNS resolution when it navigates to the URL. An attacker who controls DNS for a hostname with a short TTL returns a public IP on the first query (Gotenberg allows) and a private IP on the second query (Chromium connects to the attacker-chosen internal address). The CDP Fetch.requestPaused handler re-checks the URL but runs its own DNS resolution, leaving a timing window before Chromium's actual TCP connect. The rendered internal service response returns to the caller as a PDF. This vulnerability is fixed in 8.32.0.

PUBLISHED Reserved 2026-04-29 | Published 2026-05-14 | Updated 2026-05-14 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 8.32.0
affected

References

github.com/...enberg/security/advisories/GHSA-2pmr-289p-44r3 exploit

github.com/...enberg/security/advisories/GHSA-2pmr-289p-44r3

cve.org (CVE-2026-42592)

nvd.nist.gov (CVE-2026-42592)

Download JSON