Vulnerability Description
Gotenberg is a Docker-powered stateless API for PDF files. Prior to 8.32.0, FilterOutboundURL resolves the hostname, checks the resolved IPs against the private-address deny-list, and returns only the error. It discards the resolved addresses. Chromium later performs its own DNS resolution when it navigates to the URL. An attacker who controls DNS for a hostname with a short TTL returns a public IP on the first query (Gotenberg allows) and a private IP on the second query (Chromium connects to the attacker-chosen internal address). The CDP Fetch.requestPaused handler re-checks the URL but runs its own DNS resolution, leaving a timing window before Chromium's actual TCP connect. The rendered internal service response returns to the caller as a PDF. This vulnerability is fixed in 8.32.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thecodingmachine | Gotenberg | < 8.32.0 |
Related Weaknesses (CWE)
References
- https://github.com/gotenberg/gotenberg/security/advisories/GHSA-2pmr-289p-44r3ExploitMitigationVendor Advisory
- https://github.com/gotenberg/gotenberg/security/advisories/GHSA-2pmr-289p-44r3ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-42592?
CVE-2026-42592 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Gotenberg is a Docker-powered stateless API for PDF files. Prior to 8.32.0, FilterOutboundURL resolves the hostname, checks the resolved IPs against the private-address deny-list, and returns only the...
How severe is CVE-2026-42592?
CVE-2026-42592 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42592?
Check the references section above for vendor advisories and patch information. Affected products include: Thecodingmachine Gotenberg.