Description

Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink, and -HardLink. This is a bypass of the incomplete key-sanitization fix introduced in v8.30.1. An unauthenticated attacker can rename or move any PDF being processed to an arbitrary path in the container filesystem, overwrite arbitrary files, or create symlinks and hard links at arbitrary paths.

INFO

Published Date :

2026-05-06T20:46:47.960Z

Last Modified :

2026-05-07T12:33:44.118Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-40281 vulnerability.

Vendors Products
Gotenberg
  • Gotenberg
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40281.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact