{"id":45192,"date":"2026-04-07T23:32:58","date_gmt":"2026-04-07T15:32:58","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access\/"},"modified":"2026-04-07T23:32:58","modified_gmt":"2026-04-07T15:32:58","slug":"docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access\/","title":{"rendered":"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi1fiR51KBq7hNIR1D2V9e0jituEJTVutYd8b9v6KR0YdA30xWCSKJo3nfIykSdYSjZNe7gvNj3Wf3HidhZ24n-piDo8LhrE6ctyZrcLYNcJwCSP0KEe7G0Fl_xJm676Dv-4bFEh63Vv_xZ1zb9qOKhfeWFN5IexOHligHBCTHyVLAMDl0aeL2olDxnjfch\/s1600\/ai-chat.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi1fiR51KBq7hNIR1D2V9e0jituEJTVutYd8b9v6KR0YdA30xWCSKJo3nfIykSdYSjZNe7gvNj3Wf3HidhZ24n-piDo8LhrE6ctyZrcLYNcJwCSP0KEe7G0Fl_xJm676Dv-4bFEh63Vv_xZ1zb9qOKhfeWFN5IexOHligHBCTHyVLAMDl0aeL2olDxnjfch\/s1600\/ai-chat.jpg\" alt=\"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access\"\/><\/a><\/div>\n<p>A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins&nbsp;(<a href=\"https:\/\/docs.docker.com\/engine\/extend\/plugins_authorization\/\">AuthZ<\/a>) under specific circumstances.<\/p>\n<p>The vulnerability, tracked&nbsp;as <strong>CVE-2026-34040<\/strong> (CVSS score: 8.8), stems from an incomplete fix&nbsp;for <a href=\"https:\/\/thehackernews.com\/2024\/07\/critical-docker-engine-flaw-allows.html\">CVE-2024-41110<\/a>, a maximum-severity vulnerability in the same component that came to light in July&nbsp;2024.<\/p>\n<p>&#8220;Using a specially-crafted API request, an attacker could make the Docker daemon forward the request to an authorization plugin without the body,&#8221; Docker Engine maintainers <a href=\"https:\/\/github.com\/moby\/moby\/security\/advisories\/GHSA-x744-4wpc-v9h2\">said<\/a> in an advisory released late last month. &#8220;The authorization plugin may allow a&nbsp;request which&nbsp;it would have otherwise denied if the body had been forwarded to&nbsp;it.&#8221;<\/p>\n<p>&#8220;Anyone who depends on authorization plugins that introspect the request body to make access control decisions is potentially impacted.&#8221;<\/p>\n<p>Multiple security vulnerabilities, including Asim Viladi Oglu Manizada, Cody, Oleh Konko, and Vladimir Tokarev, have been credited with independently discovering and reporting the bug. The&nbsp;issue has been patched in Docker Engine version&nbsp;29.3.1.<\/p>\n<p>According to a report published by Cyera Research Labs researcher Tokarev, the vulnerability stems from the fact that the fix for CVE-2024-41110 did not properly handle oversized HTTP request bodies, thereby opening the door to a scenario where a single padded HTTP request can be used to create a privileged container with host file system&nbsp;access.<\/p>\n<p>In a hypothetical attack scenario, an attacker who has Docker API access restricted by an AuthZ plugin can undermine the mechanism by padding a container creation request to more than 1MB, causing it to be dropped before reaching the&nbsp;plugin.<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiH4ka_B1DSzlUVuDeXn6XJ7EwZu_-onrUOiFhKNTNAO5A2GZpkNeHmIrVrAMn_hijwElw3MpQ5MjZJ0wCt6RhEVtZPf6nMirUTQ6VlbLSGUkD5SDex3P5me9gBbMQGP86nTS3DRpQr9SCXKGH9f9cvnxzde_OjXQZP4QubuEaL4IcReJ4hM9VWwehmRhcy\/s1600\/flow-2.png\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"232\" data-original-width=\"1600\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiH4ka_B1DSzlUVuDeXn6XJ7EwZu_-onrUOiFhKNTNAO5A2GZpkNeHmIrVrAMn_hijwElw3MpQ5MjZJ0wCt6RhEVtZPf6nMirUTQ6VlbLSGUkD5SDex3P5me9gBbMQGP86nTS3DRpQr9SCXKGH9f9cvnxzde_OjXQZP4QubuEaL4IcReJ4hM9VWwehmRhcy\/s1600\/flow-2.png\" alt=\"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access\" \/><\/a><\/div>\n<p>&#8220;The plugin allows the request because it sees nothing to block,&#8221;&nbsp;Tokarev <a href=\"https:\/\/www.cyera.com\/research\/one-megabyte-to-root-how-a-size-check-broke-dockers-last-line-of-defense\">said<\/a> in a report shared with The Hacker News. &#8220;The Docker daemon processes the full request and creates a privileged container with root access to the host: your AWS credentials, SSH keys, Kubernetes configs, and everything else on the machine. This&nbsp;works against every AuthZ plugin in the ecosystem.&#8221;<\/p>\n<p>What&#8217;s more, an artificial intelligence (AI) coding agent&nbsp;like <a href=\"https:\/\/www.docker.com\/blog\/run-openclaw-securely-in-docker-sandboxes\/\">OpenClaw running inside a Docker-based&nbsp;sandbox<\/a> can be tricked into executing a prompt injection concealed within a specifically crafted GitHub repository as part of a regular developer workflow, resulting in the execution of malicious code that exploits CVE-2026-34040 to bypass authorization using the above approach and create a privileged container and mount the host file&nbsp;system.<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigRGlEo7XzRq2E2fqxGJdV3OCM6Yck6N3WlKKwAW-RKb2zQi0PPG7ILIoBhNWYuWlcBqPvTkncoBivRO2LaBi9PTod-G2smCkBTUR2uexu4sWqml3Mx8XwZSKudbfUWeg1FmLi_v8ahOPbluvIIHJx2gntn-oeloAhJlz8YLKm19i-2a7j5Q47xxLYYcMe\/s1600\/flow-1.png\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"883\" data-original-width=\"1600\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigRGlEo7XzRq2E2fqxGJdV3OCM6Yck6N3WlKKwAW-RKb2zQi0PPG7ILIoBhNWYuWlcBqPvTkncoBivRO2LaBi9PTod-G2smCkBTUR2uexu4sWqml3Mx8XwZSKudbfUWeg1FmLi_v8ahOPbluvIIHJx2gntn-oeloAhJlz8YLKm19i-2a7j5Q47xxLYYcMe\/s1600\/flow-1.png\" alt=\"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access\" \/><\/a><\/div>\n<p>With this level of access in place, the attacker can extract credentials for&nbsp;cloud services, and abuse them to take control of cloud accounts, Kubernetes clusters, and even SSH into production&nbsp;servers.<\/p>\n<p>It doesn&#8217;t end there. Cyera&nbsp;also cautioned that AI agents&nbsp;can <a href=\"https:\/\/ona.com\/stories\/how-claude-code-escapes-its-own-denylist-and-sandbox\">figure out the bypass on their&nbsp;own<\/a> and trigger it by constructing a padded HTTP request upon encountering errors when attempting to access files&nbsp;like <a href=\"https:\/\/kubernetes.io\/docs\/concepts\/configuration\/organize-cluster-access-kubeconfig\/\">kubeconfig<\/a> as part of a legitimate debugging task issued by a developer (e.g., debug the K8s out-of-memory issue). This&nbsp;approach eliminates the need for planting a poisoned repository containing the malicious instructions.<\/p>\n<p>&#8220;AuthZ plugin denied the mount request,&#8221; Cyera explained. &#8220;The agent has access to the Docker API and knows how HTTP works. CVE-2026-34040 doesn&#8217;t require any exploit code, privilege, or special tools. It&#8217;s a single HTTP request with extra padding. Any&nbsp;agent that can read Docker API documentation can construct&nbsp;it.&#8221;<\/p>\n<p>As temporary workarounds, it&#8217;s recommended to avoid using AuthZ plugins that rely on request body inspection for security decisions, limit access to the Docker API to trusted parties by following the principle of least privilege, or run Docker&nbsp;in <a href=\"https:\/\/docs.docker.com\/engine\/security\/rootless\/\">rootless&nbsp;mode<\/a>.<\/p>\n<p>&#8220;In rootless mode, even a privileged container&#8217;s &#8216;root&#8217; maps to an unprivileged host UID,&#8221; Tokarev said. &#8220;The blast radius drops from &#8216;full host compromise&#8217; to &#8216;compromised unprivileged user.&#8217; For environments that can&#8217;t go fully rootless, &#8211;userns-remap provides similar UID&nbsp;mapping.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins&nbsp;(AuthZ) under specific circumstances.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45192","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45192"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45192\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}