Description
Gotenberg is a Docker-powered stateless API for PDF files. Prior to 8.32.0, Gotenberg's Chromium URL-to-PDF endpoint (/forms/chromium/convert/url) has no default protection against HTTP/HTTPS-based SSRF. The default deny-list regex only blocks file:// URIs. An unauthenticated attacker can point Chromium at any internal IP — including loopback, RFC 1918 ranges, and cloud metadata endpoints — and receive the response rendered as a PDF. Additionally, even when operators configure a custom deny-list, the protection is bypassed via HTTP redirects. Gotenberg's Chromium instance follows 302 redirects from an attacker-controlled external URL to internal targets without re-validating the redirect destination against the deny-list. This vulnerability is fixed in 8.32.0.
Published: 2026-05-14
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Gotenberg’s Chromium URL‑to‑PDF endpoint (/forms/chromium/convert/url) allows an unauthenticated attacker to specify any HTTP or HTTPS target. The service renders the returned page as a PDF, effectively providing the attacker access to internal resources. Because the default deny‑list only blocks file:// URIs, internal IP addresses, loopback, RFC 1918 ranges, and cloud metadata endpoints are reachable. Even when a custom deny‑list is configured, the vulnerability is bypassed by following 302 redirects from an attacker‑controlled external URL to the target, as the redirect destination is not re‑validated. This results in a high‑severity SSRF that can expose sensitive internal data, enabling the attacker to download files, probe internal services, or generate PDFs containing internal content, thereby compromising confidentiality and integrity of internal systems.

Affected Systems

All installations of Gotenberg prior to version 8.32.0, regardless of deployment method, including Docker containers using older image tags, are affected.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.6, indicating a high severity. The EPSS score is not available, and it is not listed in CISA’s KEV catalog, implying lower known exploitation activity. However, the flaw is exploitable with minimal effort: an unauthenticated attacker can simply send a crafted request to the endpoint, and Gotenberg will fetch the target and return a PDF, bypassing any deny‑list rules via redirects. The likely attack vector is HTTP requests to the public WWW interface of the Gotenberg service. An attacker does not need authentication or privileged credentials; the vulnerability can be exploited from any network that can reach the service.

Generated by OpenCVE AI on May 14, 2026 at 18:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Gotenberg to version 8.32.0 or later to apply the fixing changes.
  • If a date‑of‑upgrade cannot be performed immediately, restrict traffic to the /forms/chromium/convert/url endpoint using firewall rules or network segmentation so that only trusted hosts can reach it.
  • Consider disabling the Chromium conversion endpoint entirely if the functionality is not required for the deployment.

Generated by OpenCVE AI on May 14, 2026 at 18:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-chwh-f6gm-r836 Gotenberg: Server-Side Request Forgery via Chromium URL Endpoint with Redirect-Based Deny-List Bypass
History

Thu, 14 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Gotenberg
Gotenberg gotenberg
Vendors & Products Gotenberg
Gotenberg gotenberg

Thu, 14 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description Gotenberg is a Docker-powered stateless API for PDF files. Prior to 8.32.0, Gotenberg's Chromium URL-to-PDF endpoint (/forms/chromium/convert/url) has no default protection against HTTP/HTTPS-based SSRF. The default deny-list regex only blocks file:// URIs. An unauthenticated attacker can point Chromium at any internal IP — including loopback, RFC 1918 ranges, and cloud metadata endpoints — and receive the response rendered as a PDF. Additionally, even when operators configure a custom deny-list, the protection is bypassed via HTTP redirects. Gotenberg's Chromium instance follows 302 redirects from an attacker-controlled external URL to internal targets without re-validating the redirect destination against the deny-list. This vulnerability is fixed in 8.32.0.
Title Gotenberg: Server-Side Request Forgery via Chromium URL Endpoint with Redirect-Based Deny-List Bypass
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Gotenberg Gotenberg
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T18:56:42.860Z

Reserved: 2026-04-29T00:31:15.724Z

Link: CVE-2026-42595

cve-icon Vulnrichment

Updated: 2026-05-14T18:50:19.853Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T16:16:22.753

Modified: 2026-05-14T16:28:04.847

Link: CVE-2026-42595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T18:45:26Z

Weaknesses