Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-42589 | 9.8 CRITICAL | Gotenberg: Unauthenticated RCE via ExifTool Metadata Key Injection |
| CVE-2026-42596 | 9.4 CRITICAL | Gotenberg: Unauthenticated SSRF via default deny-list bypass in downloadFrom and webhook |
| CVE-2026-42595 | 8.6 HIGH | Gotenberg: Server-Side Request Forgery via Chromium URL Endpoint with Redirect-Based Deny- |
| CVE-2026-42591 | 8.2 HIGH | Gotenberg: Server-Side Request Forgery (SSRF) in github.com/gotenberg/gotenberg/v8 |
| CVE-2026-42590 | 8.2 HIGH | Gotenberg: ExifTool group-prefix syntax bypasses dangerous-tag blocklist |
| CVE-2026-40893 | 8.2 HIGH | Gotenberg: ExifTool Dangerous Tag Blocklist Bypass via Group-Prefixed Tag Names Allows Arb |
| CVE-2026-42594 | 7.5 HIGH | Gotenberg: Unauthenticated denial of service via echo.Context pool reuse in webhook async |
| CVE-2026-42593 | 5.3 MEDIUM | Gotenberg: Arbitrary PDF read via stampExpression and watermarkExpression in merge, split, |
| CVE-2026-42592 | 5.3 MEDIUM | Gotenberg: DNS rebinding bypasses SSRF validation on Chromium URL conversion routes |
No comments yet