GHSA-QMWH-9M9C-H36M: Arbitrary File Write and Blocklist Bypass in Gotenberg ExifTool Integration
Vulnerability ID: GHSA-QMWH-9M9C-H36M
CVSS Score: 8.7
Published: 2026-04-07
Gotenberg version 8.29.0 contains an incomplete fix for an arbitrary file write vulnerability within its ExifTool metadata update process. The initial patch implemented a case-sensitive blocklist that attackers can bypass using alternate casing or previously unblocked pseudo-tags, leading to arbitrary file writes, renames, and hard or symbolic link creation.
TL;DR
An unauthenticated arbitrary file write vulnerability in Gotenberg stems from a case-sensitive blocklist bypass. Attackers leverage ExifTool's case-insensitive pseudo-tags to manipulate server files, compromising system integrity.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-178
- CVSS Score: 8.7
- Attack Vector: Network
- Authentication Required: None
- Privileges Required: None
- Exploit Status: Proof-of-Concept
- Impact: Arbitrary File Write / System Integrity Compromise
Affected Systems
- Gotenberg v8.29.0
- ExifTool metadata processing pipeline
-
Gotenberg: >= 8.29.0, < 8.30.0 (Fixed in:
8.30.0)
Code Analysis
Commit: 15050a3
Fix blocklist bypass by using case-insensitive metadata key comparison and expanding blocked tags.
Exploit Details
- Official Advisory: Proof-of-concept curl commands demonstrating the case-sensitive bypass and missing pseudo-tags.
Mitigation Strategies
- Upgrade to patched software version
- Network segmentation and access control
- API request payload inspection
Remediation Steps:
- Upgrade Gotenberg deployment to version 8.30.0 or higher.
- Configure network policies or reverse proxy configurations to ensure the Gotenberg API is inaccessible from the public internet.
- Implement WAF rules to inspect JSON metadata payloads and block requests containing keys matching case-insensitive regular expressions for
filename,directory,hardlink, andsymlink. - Deploy host-based file integrity monitoring (FIM) within the container environment to alert on suspicious file movements originating from the Gotenberg process.
References
Read the full report for GHSA-QMWH-9M9C-H36M on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)