CVE-2026-40281 PUBLISHED

Gotenberg vulnerable to argument injection via newlines in ExifTool metadata values

Assigner: GitHub_M
Reserved: 10.04.2026 Published: 06.05.2026 Updated: 06.05.2026

Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink, and -HardLink. This is a bypass of the incomplete key-sanitization fix introduced in v8.30.1. An unauthenticated attacker can rename or move any PDF being processed to an arbitrary path in the container filesystem, overwrite arbitrary files, or create symlinks and hard links at arbitrary paths.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
CVSS Score: 10

Product Status

Vendor gotenberg
Product gotenberg
Versions
  • Version <= 8.30.1 is affected

References

Problem Types

  • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') CWE