CVE-2026-27018 Overview
Gotenberg is a Docker-powered stateless API designed for converting document formats such as HTML, Markdown, Word, Excel, and images to PDF. A security bypass vulnerability exists in Gotenberg versions prior to 8.29.0 where the previous fix for CVE-2024-21527 can be circumvented by using mixed-case or uppercase URL schemes. This path traversal bypass allows attackers to exploit the same underlying vulnerability through case manipulation of URL protocols.
Critical Impact
Attackers can bypass URL scheme validation controls by using mixed-case or uppercase variations (e.g., HTTP://, HtTp://), potentially enabling server-side request forgery (SSRF) or path traversal attacks that were previously mitigated by the CVE-2024-21527 patch.
Affected Products
- Gotenberg versions prior to 8.29.0
- Systems utilizing Gotenberg API for document conversion
- Docker deployments running vulnerable Gotenberg containers
Discovery Timeline
- 2026-03-30 - CVE-2026-27018 published to NVD
- 2026-04-01 - Last updated in NVD database
Technical Details for CVE-2026-27018
Vulnerability Analysis
This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), commonly known as Path Traversal. The flaw stems from insufficient case-insensitive validation of URL schemes in the security controls implemented for the prior CVE-2024-21527 fix. When URL scheme validation was added, it only checked for lowercase protocol handlers, leaving an exploitable gap when attackers submit requests with non-standard casing.
The network-based attack vector requires no authentication or user interaction, making it straightforward for remote attackers to exploit. Successful exploitation can lead to high confidentiality impact, allowing unauthorized access to sensitive data, and limited integrity impact on the target system.
Root Cause
The root cause is a case-sensitive string comparison in URL scheme validation logic. The original mitigation for CVE-2024-21527 implemented allowlist checks for URL protocols but failed to normalize the scheme to lowercase before comparison. This oversight allows attackers to bypass security filters by simply changing the case of URL scheme characters (e.g., using HTTP:// or HtTp:// instead of http://).
Attack Vector
The vulnerability is exploitable remotely over the network with low attack complexity. An attacker can craft malicious requests to the Gotenberg API containing URL references with mixed-case or uppercase schemes. Since the validation logic performs case-sensitive matching, these modified URLs pass through the security checks, enabling the same attack surface that CVE-2024-21527 originally exposed. This could allow attackers to access internal resources, read sensitive files, or perform server-side request forgery attacks depending on the deployment configuration.
Detection Methods for CVE-2026-27018
Indicators of Compromise
- Unusual URL schemes in Gotenberg API request logs containing uppercase or mixed-case protocols (e.g., HTTP://, FILE://, HtTp://)
- Failed or anomalous document conversion requests with non-standard URL patterns
- Access attempts to internal network resources or localhost addresses through document conversion endpoints
- Increased error rates in Gotenberg services related to URL processing
Detection Strategies
- Implement log monitoring for API requests containing URL schemes with any uppercase characters
- Deploy web application firewall (WAF) rules to detect and block mixed-case URL scheme patterns
- Enable detailed request logging on Gotenberg endpoints to capture full URL parameters
- Configure network monitoring to detect unusual outbound connections originating from Gotenberg containers
Monitoring Recommendations
- Review Gotenberg access logs for requests containing non-lowercase URL schemes in document conversion parameters
- Monitor for requests attempting to access internal IP ranges (10.x.x.x, 172.16-31.x.x, 192.168.x.x) or localhost
- Set up alerting for high volumes of failed conversion requests that may indicate exploitation attempts
- Track Gotenberg container network activity for unexpected outbound connections
How to Mitigate CVE-2026-27018
Immediate Actions Required
- Upgrade Gotenberg to version 8.29.0 or later immediately
- Review application logs for signs of exploitation attempts using mixed-case URL schemes
- Audit any systems that may have been compromised prior to patching
- Restrict network access to Gotenberg API endpoints to trusted sources only
Patch Information
The vulnerability has been patched in Gotenberg version 8.29.0. The fix ensures case-insensitive URL scheme validation, preventing bypass through case manipulation. Detailed patch information is available:
Workarounds
- Deploy a reverse proxy or WAF in front of Gotenberg that normalizes URL schemes to lowercase before forwarding requests
- Implement application-level input validation that converts all URL schemes to lowercase before passing to Gotenberg
- Restrict the Gotenberg container's network access to prevent SSRF exploitation if immediate patching is not possible
- Disable or limit URL-based document fetching features if not required for business operations
# Update Gotenberg container to patched version
docker pull gotenberg/gotenberg:8.29.0
docker stop gotenberg-container
docker rm gotenberg-container
docker run -d --name gotenberg-container -p 3000:3000 gotenberg/gotenberg:8.29.0
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

