CVE-2026-40281
Gotenberg · Gotenberg
Gotenberg contains a command injection vulnerability where unsanitized metadata values allow attackers to manipulate ExifTool arguments, leading to arbitrary file system operations.
Executive summary
An unauthenticated command injection vulnerability in Gotenberg allows attackers to overwrite or move arbitrary files within the container environment.
Vulnerability
The application fails to sanitize newline characters in metadata values, allowing an unauthenticated attacker to inject ExifTool flags. This permits the manipulation of files, including the creation of symlinks or overwriting system files.
Business impact
This flaw grants an attacker significant control over the container file system, which may lead to privilege escalation or the destruction of critical application data. Given the 10.0 CVSS score, the potential for total loss of container integrity and subsequent lateral movement is extreme.
Remediation
Immediate Action: Upgrade to the latest version of Gotenberg to ensure proper metadata sanitization.
Proactive Monitoring: Review application logs for evidence of unusual metadata input or unexpected file system operations within the container.
Compensating Controls: Run the container with a read-only root file system and strictly limit the privileges of the user running the service to minimize the impact of file-system manipulation.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability is critical due to its potential for full container compromise. Organizations utilizing Gotenberg should apply the vendor-supplied patches immediately to prevent unauthorized file system modifications.