Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q7r4-hc83-hf2q | Gotenberg has ExifTool stdin argument injection via metadata value newlines (bypass of key sanitization fix) |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thecodingmachine
Thecodingmachine gotenberg |
|
| CPEs | cpe:2.3:a:thecodingmachine:gotenberg:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Thecodingmachine
Thecodingmachine gotenberg |
Thu, 07 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gotenberg
Gotenberg gotenberg |
|
| Vendors & Products |
Gotenberg
Gotenberg gotenberg |
Wed, 06 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink, and -HardLink. This is a bypass of the incomplete key-sanitization fix introduced in v8.30.1. An unauthenticated attacker can rename or move any PDF being processed to an arbitrary path in the container filesystem, overwrite arbitrary files, or create symlinks and hard links at arbitrary paths. | |
| Title | Gotenberg vulnerable to argument injection via newlines in ExifTool metadata values | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T12:33:44.118Z
Reserved: 2026-04-10T20:22:44.034Z
Link: CVE-2026-40281
Updated: 2026-05-07T12:32:59.186Z
Status : Analyzed
Published: 2026-05-06T21:16:01.353
Modified: 2026-05-11T14:46:07.127
Link: CVE-2026-40281
No data.
OpenCVE Enrichment
Updated: 2026-05-06T23:00:15Z
Github GHSA