| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g924-cjx7-2rjw | Gotenberg allows Chromium URL conversion routes to read arbitrary files under /tmp via file:// scheme |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gotenberg
Gotenberg gotenberg |
|
| Vendors & Products |
Gotenberg
Gotenberg gotenberg |
Thu, 14 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gotenberg is a Docker-powered stateless API for PDF files. Prior to 8.32.0, the /forms/chromium/convert/url and /forms/chromium/screenshot/url routes accept url=file:///tmp/... from anonymous callers. The default Chromium deny-list intentionally exempts file:///tmp/ so HTML/Markdown routes can load their own request-local assets, and those routes apply a per-request AllowedFilePrefixes guard to scope the read. The URL routes never set AllowedFilePrefixes, so the scope guard silently skips. Alice enumerates /tmp/, walks Gotenberg's per-request working directories, and reads the raw source files of other in-flight conversions as rendered PDF output. This vulnerability is fixed in 8.32.0. | |
| Title | Gotenberg: Chromium URL conversion routes read arbitrary files under /tmp via file:// scheme | |
| Weaknesses | CWE-73 CWE-918 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T18:04:08.631Z
Reserved: 2026-04-29T00:31:15.724Z
Link: CVE-2026-42597
Updated: 2026-05-14T18:04:00.523Z
Status : Undergoing Analysis
Published: 2026-05-14T16:16:23.037
Modified: 2026-05-14T18:16:48.200
Link: CVE-2026-42597
No data.
OpenCVE Enrichment
Updated: 2026-05-14T17:45:25Z
Github GHSA