<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40893 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40893/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 19:21:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40893/feed.xml" rel="self" type="application/rss+xml"/><item><title>Gotenberg ExifTool Tag Blocklist Bypass via Group-Prefixed Tag Names</title><link>https://feed.craftedsignal.io/briefs/2026-05-gotenberg-exiftool-bypass/</link><pubDate>Mon, 04 May 2026 19:21:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gotenberg-exiftool-bypass/</guid><description>Gotenberg is vulnerable to an ExifTool tag blocklist bypass, allowing unauthenticated attackers to rename, move, and modify permissions of files within the container by using group-prefixed tag names like 'System:FileName' or the 'FilePermissions' tag in HTTP requests.</description><content:encoded><![CDATA[<p>Gotenberg, a Docker-based server for document conversion, is susceptible to a critical vulnerability (CVE-2026-40893) that bypasses its intended security measures. Specifically, a blocklist designed to prevent arbitrary file renaming and moving via ExifTool is circumvented by using group-prefixed tag names such as <code>System:FileName</code>. This vulnerability, affecting Gotenberg version 8.30.1 and earlier, allows unauthenticated attackers to manipulate files within the container by sending crafted HTTP requests. The bypass allows for renaming files, moving files to arbitrary directories, and changing file permissions, potentially leading to service disruption or, in shared-volume deployments, impacting other services utilizing the same volumes. This vulnerability effectively negates the patch provided in GHSA-qmwh-9m9c-h36m.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Gotenberg instance (version 8.30.1 or earlier) exposed via HTTP.</li>
<li>The attacker crafts a POST request to any Gotenberg endpoint that accepts the <code>metadata</code> field, such as <code>/forms/pdfengines/metadata/write</code>, <code>/forms/chromium/convert/html</code>, or <code>/forms/libreoffice/convert</code>.</li>
<li>The request includes a <code>files</code> parameter with a PDF file (or any other supported file type).</li>
<li>The request includes a <code>metadata</code> parameter, a JSON object containing malicious ExifTool tag names such as <code>System:FileName</code> and <code>System:Directory</code>.</li>
<li>Gotenberg&rsquo;s <code>exiftool.go</code> validates the tag names against a blocklist but fails to normalize group prefixes, allowing <code>System:FileName</code> to bypass the check that would block <code>FileName</code>.</li>
<li>ExifTool receives the <code>System:FileName</code> and <code>System:Directory</code> tags and interprets them as <code>FileName</code> and <code>Directory</code>, respectively.</li>
<li>ExifTool renames and moves the uploaded file to the attacker-specified location within the container&rsquo;s file system.</li>
<li>If Gotenberg attempts to access the file after it has been moved, the server returns a 404 error, potentially disrupting service for other users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-40893) allows an unauthenticated attacker to manipulate files within the Gotenberg container. This includes the ability to rename files, move them to arbitrary directories, and change their permissions. This can lead to denial-of-service conditions due to missing files, or in scenarios where Gotenberg shares a Docker volume with other services, it allows for planting malicious files in those shared directories. Since no authentication is required by default, any system capable of sending HTTP requests to the Gotenberg instance can exploit this vulnerability, widening the attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Gotenberg greater than 8.30.1 to remediate CVE-2026-40893.</li>
<li>Deploy the Sigma rule <code>Detect Gotenberg ExifTool Tag Blocklist Bypass</code> to identify exploitation attempts based on the use of <code>System:</code> prefixed ExifTool tags.</li>
<li>Deploy the Sigma rule <code>Detect Gotenberg FilePermissions Tag Abuse</code> to detect abuse of the <code>FilePermissions</code> tag.</li>
<li>Monitor webserver logs for POST requests to the affected Gotenberg endpoints (<code>/forms/pdfengines/metadata/write</code>, <code>/forms/chromium/convert/html</code>, <code>/forms/libreoffice/convert</code>) containing the string <code>System:FileName</code> or <code>FilePermissions</code> in the request body.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>exiftool</category><category>file-manipulation</category><category>cve-2026-40893</category></item></channel></rss>