Cases

GHSA-fmwg-qcqh-m992

HIGHView advisory
SeverityHIGH
Repositorygotenberg/gotenberg
PublishedApr 7, 2026, 6:16 PM
Ref8b65315a09e8b86b094eab47b81649cdfbfc099f
Advisory summary

Gotenberg Vulnerable to ReDoS via extraHttpHeaders scope feature

Curator analysis
Synopsis

User-supplied `extraHttpHeaders` scope patterns are compiled with `regexp2` in Chromium form handling without setting `MatchTimeout`, enabling ReDoS and worker hangs.

Vulnerability classes
regular expression denial of service (ReDoS)denial of service
Sink hints

pkg/modules/chromium/routes.go

The advisory and fix both point to Chromium form parsing logic where `extraHttpHeaders` scope regexes are compiled from user input, and the fix adds a `regexp2` timeout in this file.

Expected components
Chromium form-data option parsingextraHttpHeaders scope featureregexp2 pattern compilation

Model scores(5)

openai/gpt-5.4excellent
Target Alignment
27
Source To Sink Reasoning
29
Impact And Exploitability
19
Evidence Quality
8
Overclaim Control
10
moonshotai/kimi-k2.5excellent
Target Alignment
26
Source To Sink Reasoning
29
Impact And Exploitability
19
Evidence Quality
8
Overclaim Control
9
z-ai/glm-5.1excellent
Target Alignment
27
Source To Sink Reasoning
29
Impact And Exploitability
18
Evidence Quality
8
Overclaim Control
9
anthropic/claude-opus-4.6excellent
Target Alignment
28
Source To Sink Reasoning
27
Impact And Exploitability
18
Evidence Quality
8
Overclaim Control
9
google/gemini-3.1-pro-previewpartial
Target Alignment
24
Source To Sink Reasoning
24
Impact And Exploitability
15
Evidence Quality
8
Overclaim Control
7