CVE-2026-40893: Gotenberg Allows Arbitrary File Manipulation
The National Vulnerability Database has detailed CVE-2026-40893, a high-severity vulnerability (CVSS 8.2) impacting Gotenberg, a Docker-powered stateless API for PDF files. This flaw stems from inadequate tag validation; Gotenberg versions prior to 8.31.0 only check for an exact ‘FileName’ tag. This allows attackers to bypass controls by injecting ‘System:FileName’, which the underlying ExifTool utility then processes.
This oversight enables remote attackers to manipulate arbitrary files on the system. Specifically, an attacker can move, rename, and alter permissions for files, leading to significant integrity and availability risks. The vulnerability is categorized under CWE-73 (External Control of File Name or Path) and CWE-184 (Incomplete List of Disallowed Inputs).
Defenders using Gotenberg must prioritize patching to version 8.31.0 or later immediately. This isn’t theoretical — arbitrary file operations are a golden ticket for further compromise, data exfiltration, or denial-of-service. Ignoring this means leaving a wide-open door for an attacker to reconfigure your environment or destroy critical data.
What This Means For You
- If your organization utilizes Gotenberg for PDF processing, you are directly exposed to CVE-2026-40893. Check your Gotenberg deployment version immediately and patch to 8.31.0 or newer. Failure to do so grants remote attackers the ability to move, rename, and change permissions on arbitrary files within your system.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-40893: Gotenberg Arbitrary File Manipulation via FileName Tag
title: CVE-2026-40893: Gotenberg Arbitrary File Manipulation via FileName Tag
id: scw-2026-05-14-ai-1
status: experimental
level: high
description: |
This rule detects potential exploitation of CVE-2026-40893 by identifying requests to the Gotenberg '/convert' endpoint that include the 'FileName' query parameter. This parameter is specifically targeted by the vulnerability, allowing attackers to manipulate arbitrary files on the system. The rule looks for POST requests with a 200 status code, indicating a successful, albeit malicious, operation.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-40893/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/convert'
cs-uri-query|contains:
- 'FileName'
cs-method|exact:
- 'POST'
sc-status|exact:
- '200'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40893 | Path Traversal | Gotenberg < 8.31.0 |
| CVE-2026-40893 | File Manipulation | Gotenberg vulnerable to 'System:FileName' tag bypass |
| CVE-2026-40893 | Arbitrary File Operations | Gotenberg allows remote attackers to move, rename, and change permissions for arbitrary files |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 19:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.