Home

Description

Gotenberg is a Docker-powered stateless API for PDF files. Prior to 8.31.0, the default deny-lists used by Gotenberg's downloadFrom feature and webhook feature are bypassable. Because the filter is regex-based and case-sensitive, an unauthenticated attacker can supply URLs such as http://[::ffff:127.0.0.1]:... and reach loopback or private HTTP services that the default deny-list is intended to block. This crosses a real security boundary because an external caller can force the server to make outbound requests to internal-only targets. This vulnerability is fixed in 8.31.0.

PUBLISHED Reserved 2026-04-29 | Published 2026-05-14 | Updated 2026-05-15 | Assigner GitHub_M




CRITICAL: 9.4CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 8.31.0
affected

References

github.com/...enberg/security/advisories/GHSA-4vmc-gm8v-m35h exploit

github.com/...enberg/security/advisories/GHSA-4vmc-gm8v-m35h

cve.org (CVE-2026-42596)

nvd.nist.gov (CVE-2026-42596)

Download JSON