PT-2026-28593 · Docker · Docker
Manizada
·
Published
2026-03-25
·
Updated
2026-04-08
·
CVE-2026-34040
CVSS v3.1
8.8
High
| AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Moby versions prior to 29.3.1
Description
A security issue exists in Moby that allows attackers to bypass authorization plugins (AuthZ) by providing oversized request bodies. This bypass can lead to unauthorized privileged container creation, potentially resulting in host escape and lateral movement within container environments. The issue is an incomplete fix for CVE-2024-41110. If you depend on AuthZ plugins that introspect the request body to make access control decisions, you are potentially impacted.
Recommendations
Update to version 29.3.1 or later to address this issue. If an immediate update is not possible, avoid using AuthZ plugins that rely on request body inspection for security decisions. Restrict access to the Docker API to trusted parties, following the principle of least privilege.
Exploit
Fix
Authentication Bypass Using an Alternate Path or Channel
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Docker