๐Ÿ” CVE Alert

CVE-2026-39383

UNKNOWN 0.0

Gotenberg unauthenticated blind SSRF via unfiltered webhook URL

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Gotenberg is an API-based document conversion tool. In version 8.29.1, an unauthenticated attacker with network access can force the server to make outbound HTTP POST requests to arbitrary internal or external destinations by supplying a crafted URL in the Gotenberg-Webhook-Url request header. The FilterDeadline function in filter.go is intended to gate outbound URLs, but when both the allow-list and deny-list are empty (the default configuration), it returns nil unconditionally and permits any URL. This is a blind SSRF: Gotenberg POSTs the converted document to the webhook URL and only checks whether the response status code is an error, but never returns the target's response body to the attacker. An attacker can use this to probe internal network infrastructure by observing whether the error callback is invoked, force POST requests against internal services that perform side effects, and confirm reachability of cloud metadata endpoints. The retryable HTTP client issues up to 4 automatic retries per request, amplifying each probe. This issue has been fixed in version 8.31.0. As a workaround, configure the GOTENBERG_API_WEBHOOK_ALLOW_LIST environment variable to restrict webhook URLs to known receivers, or set GOTENBERG_API_WEBHOOK_DENY_LIST to block RFC-1918 and link-local address ranges.

CWE CWE-918
Vendor gotenberg
Product gotenberg
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for gotenberg gotenberg

Be the first to know when new unknown vulnerabilities affecting gotenberg gotenberg are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

gotenberg / gotenberg
< 8.31.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gotenberg/gotenberg/security/advisories/GHSA-5vh4-rgv7-p9g4