CVE-2026-40280 PUBLISHED

Gotenberg SSRF via case-insensitive URL scheme bypass in webhook and downloadFrom deny-lists

Assigner: GitHub_M
Reserved: 10.04.2026 Published: 05.05.2026 Updated: 05.05.2026

Gotenberg is an API-based document conversion tool. In versions 8.30.1 and earlier, the default private-IP deny-lists for the --webhook-deny-list and --api-download-from-deny-list flags use a case-sensitive regular expression (^https?://) to match URL schemes. Because Go's net/url.Parse() normalizes the scheme to lowercase before establishing the outbound TCP connection, an attacker can bypass the deny-list by simply capitalizing part of the URL scheme (e.g., HTTP://, HTTPS://, or Http://). This allows unauthenticated requests to reach internal network services, including private IP ranges, loopback addresses, and cloud instance metadata endpoints such as HTTP://169.254.169.254/latest/meta-data/.

This bypasses the same security control that was patched in CVE-2026-27018.

This issue has been fixed in version 8.31.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N
CVSS Score: 7.8

Product Status

Vendor gotenberg
Product gotenberg
Versions
  • Version <= 8.30.1 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE