Description
Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink, and -HardLink. This is a bypass of the incomplete key-sanitization fix introduced in v8.30.1. An unauthenticated attacker can rename or move any PDF being processed to an arbitrary path in the container filesystem, overwrite arbitrary files, or create symlinks and hard links at arbitrary paths.
INFO
Published Date :
2026-05-06T20:46:47.960Z
Last Modified :
2026-05-07T12:33:44.118Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-40281 vulnerability.
| Vendors | Products |
|---|---|
| Gotenberg |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40281.