### [CVE-2024-21527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21527) ![](https://img.shields.io/static/v1?label=Product&message=github.com%2Fgotenberg%2Fgotenberg%2Fv8%2Fpkg%2Fgotenberg&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=github.com%2Fgotenberg%2Fgotenberg%2Fv8%2Fpkg%2Fmodules%2Fchromium&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=github.com%2Fgotenberg%2Fgotenberg%2Fv8%2Fpkg%2Fmodules%2Fwebhook&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%208.1.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Server-side%20Request%20Forgery%20(SSRF)&color=brighgreen) ### Description Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as