Gotenberg vulnerable to unauthenticated SSRF via default deny-list bypass in downloadFrom and webhook — CVE-2026-42596
GHSA · GitHub · CVE-2026-42596
ID
CVE-2026-42596
CVE-2026-42596
Date
Updated
Activity
Source
GHSA
GHSA
Vendor
GitHub
GitHub
Threat
critical
critical
CVSS
9.4
9.4
Summary
### Summary The default deny-lists used by Gotenberg's `downloadFrom` feature and `webhook` feature are bypassable. Because the filter is regex-based and case-sensitive, an unauthenticated attacker can supply URLs such as `http://[::ffff:127.0.0.1]:...` and reach loopback or private HTTP services that the default deny-list is intended to block. This crosses a real security boundary because an external caller can…
Product
go: github.com/gotenberg/gotenberg/v8
What to do
General, cautious steps (verify details in the official source):
- Prioritize patching or mitigation immediately (treat as actively risky).
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.