๐Ÿ” CVE Alert

CVE-2026-40280

UNKNOWN 0.0

Gotenberg SSRF via case-insensitive URL scheme bypass in webhook and downloadFrom deny-lists

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Gotenberg is an API-based document conversion tool. In versions 8.30.1 and earlier, the default private-IP deny-lists for the --webhook-deny-list and --api-download-from-deny-list flags use a case-sensitive regular expression (^https?://) to match URL schemes. Because Go's net/url.Parse() normalizes the scheme to lowercase before establishing the outbound TCP connection, an attacker can bypass the deny-list by simply capitalizing part of the URL scheme (e.g., HTTP://, HTTPS://, or Http://). This allows unauthenticated requests to reach internal network services, including private IP ranges, loopback addresses, and cloud instance metadata endpoints such as HTTP://169.254.169.254/latest/meta-data/. This bypasses the same security control that was patched in CVE-2026-27018. This issue has been fixed in version 8.31.0.

CWE CWE-918
Vendor gotenberg
Product gotenberg
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for gotenberg gotenberg

Be the first to know when new unknown vulnerabilities affecting gotenberg gotenberg are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

gotenberg / gotenberg
<= 8.30.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gotenberg/gotenberg/security/advisories/GHSA-5q7p-7jgv-ww56 github.com: https://github.com/gotenberg/gotenberg/commit/3f01ca18d3cc21375a1e2da4b5a3f261c8548e47 github.com: https://github.com/advisories/GHSA-jjwv-57xh-xr6r