{"id":527,"date":"2026-04-07T16:30:18","date_gmt":"2026-04-07T16:30:18","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=527"},"modified":"2026-04-07T16:30:18","modified_gmt":"2026-04-07T16:30:18","slug":"docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=527","title":{"rendered":"Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 07, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ DevSecOps<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi1fiR51KBq7hNIR1D2V9e0jituEJTVutYd8b9v6KR0YdA30xWCSKJo3nfIykSdYSjZNe7gvNj3Wf3HidhZ24n-piDo8LhrE6ctyZrcLYNcJwCSP0KEe7G0Fl_xJm676Dv-4bFEh63Vv_xZ1zb9qOKhfeWFN5IexOHligHBCTHyVLAMDl0aeL2olDxnjfch\/s1700-e365\/ai-chat.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins\u00a0(<a href=\"https:\/\/docs.docker.com\/engine\/extend\/plugins_authorization\/\">AuthZ<\/a>) under specific circumstances.<\/p>\n<p>The vulnerability, tracked\u00a0as <strong>CVE-2026-34040<\/strong> (CVSS score: 8.8), stems from an incomplete fix\u00a0for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July\u00a02024.<\/p>\n<p>\u00abUsing a specially-crafted API request, an attacker could make the Docker daemon forward the request to an authorization plugin without the body,\u00bb Docker Engine maintainers <a href=\"https:\/\/github.com\/moby\/moby\/security\/advisories\/GHSA-x744-4wpc-v9h2\">said<\/a> in an advisory released late last month. \u00abThe authorization plugin may allow a\u00a0request which\u00a0it would have otherwise denied if the body had been forwarded to\u00a0it.\u00bb<\/p>\n<p>\u00abAnyone who depends on authorization plugins that introspect the request body to make access control decisions is potentially impacted.\u00bb<\/p>\n<p>Multiple security vulnerabilities, including Asim Viladi Oglu Manizada, Cody, Oleh Konko, and Vladimir Tokarev, have been credited with independently discovering and reporting the bug. The\u00a0issue has been patched in Docker Engine version\u00a029.3.1.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>According to a report published by Cyera Research Labs researcher Tokarev, the vulnerability stems from the fact that the fix for CVE-2024-41110 did not properly handle oversized HTTP request bodies, thereby opening the door to a scenario where a single padded HTTP request can be used to create a privileged container with host file system\u00a0access.<\/p>\n<p>In a hypothetical attack scenario, an attacker who has Docker API access restricted by an AuthZ plugin can undermine the mechanism by padding a container creation request to more than 1MB, causing it to be dropped before reaching the\u00a0plugin.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiH4ka_B1DSzlUVuDeXn6XJ7EwZu_-onrUOiFhKNTNAO5A2GZpkNeHmIrVrAMn_hijwElw3MpQ5MjZJ0wCt6RhEVtZPf6nMirUTQ6VlbLSGUkD5SDex3P5me9gBbMQGP86nTS3DRpQr9SCXKGH9f9cvnxzde_OjXQZP4QubuEaL4IcReJ4hM9VWwehmRhcy\/s1700-e365\/flow-2.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiH4ka_B1DSzlUVuDeXn6XJ7EwZu_-onrUOiFhKNTNAO5A2GZpkNeHmIrVrAMn_hijwElw3MpQ5MjZJ0wCt6RhEVtZPf6nMirUTQ6VlbLSGUkD5SDex3P5me9gBbMQGP86nTS3DRpQr9SCXKGH9f9cvnxzde_OjXQZP4QubuEaL4IcReJ4hM9VWwehmRhcy\/s1700-e365\/flow-2.png\" alt=\"\" border=\"0\" data-original-height=\"232\" data-original-width=\"1600\"\/><\/a><\/div>\n<p>\u00abThe plugin allows the request because it sees nothing to block,\u00bb\u00a0Tokarev <a href=\"https:\/\/www.cyera.com\/research\/one-megabyte-to-root-how-a-size-check-broke-dockers-last-line-of-defense\">said<\/a> in a report shared with The Hacker News. \u00abThe Docker daemon processes the full request and creates a privileged container with root access to the host: your AWS credentials, SSH keys, Kubernetes configs, and everything else on the machine. This\u00a0works against every AuthZ plugin in the ecosystem.\u00bb<\/p>\n<p>What&#8217;s more, an artificial intelligence (AI) coding agent\u00a0like <a href=\"https:\/\/www.docker.com\/blog\/run-openclaw-securely-in-docker-sandboxes\/\">OpenClaw running inside a Docker-based\u00a0sandbox<\/a> can be tricked into executing a prompt injection concealed within a specifically crafted GitHub repository as part of a regular developer workflow, resulting in the execution of malicious code that exploits CVE-2026-34040 to bypass authorization using the above approach and create a privileged container and mount the host file\u00a0system.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigRGlEo7XzRq2E2fqxGJdV3OCM6Yck6N3WlKKwAW-RKb2zQi0PPG7ILIoBhNWYuWlcBqPvTkncoBivRO2LaBi9PTod-G2smCkBTUR2uexu4sWqml3Mx8XwZSKudbfUWeg1FmLi_v8ahOPbluvIIHJx2gntn-oeloAhJlz8YLKm19i-2a7j5Q47xxLYYcMe\/s1700-e365\/flow-1.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigRGlEo7XzRq2E2fqxGJdV3OCM6Yck6N3WlKKwAW-RKb2zQi0PPG7ILIoBhNWYuWlcBqPvTkncoBivRO2LaBi9PTod-G2smCkBTUR2uexu4sWqml3Mx8XwZSKudbfUWeg1FmLi_v8ahOPbluvIIHJx2gntn-oeloAhJlz8YLKm19i-2a7j5Q47xxLYYcMe\/s1700-e365\/flow-1.png\" alt=\"\" border=\"0\" data-original-height=\"883\" data-original-width=\"1600\"\/><\/a><\/div>\n<p>With this level of access in place, the attacker can extract credentials for\u00a0cloud services, and abuse them to take control of cloud accounts, Kubernetes clusters, and even SSH into production\u00a0servers.<\/p>\n<p>It doesn&#8217;t end there. Cyera\u00a0also cautioned that AI agents\u00a0can <a href=\"https:\/\/ona.com\/stories\/how-claude-code-escapes-its-own-denylist-and-sandbox\">figure out the bypass on their\u00a0own<\/a> and trigger it by constructing a padded HTTP request upon encountering errors when attempting to access files\u00a0like <a href=\"https:\/\/kubernetes.io\/docs\/concepts\/configuration\/organize-cluster-access-kubeconfig\/\">kubeconfig<\/a> as part of a legitimate debugging task issued by a developer (e.g., debug the K8s out-of-memory issue). This\u00a0approach eliminates the need for planting a poisoned repository containing the malicious instructions.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abAuthZ plugin denied the mount request,\u00bb Cyera explained. \u00abThe agent has access to the Docker API and knows how HTTP works. CVE-2026-34040 doesn&#8217;t require any exploit code, privilege, or special tools. It&#8217;s a single HTTP request with extra padding. Any\u00a0agent that can read Docker API documentation can construct\u00a0it.\u00bb<\/p>\n<p>As temporary workarounds, it&#8217;s recommended to avoid using AuthZ plugins that rely on request body inspection for security decisions, limit access to the Docker API to trusted parties by following the principle of least privilege, or run Docker\u00a0in <a href=\"https:\/\/docs.docker.com\/engine\/security\/rootless\/\">rootless\u00a0mode<\/a>.<\/p>\n<p>\u00abIn rootless mode, even a privileged container&#8217;s &#8216;root&#8217; maps to an unprivileged host UID,\u00bb Tokarev said. \u00abThe blast radius drops from &#8216;full host compromise&#8217; to &#8216;compromised unprivileged user.&#8217; For environments that can&#8217;t go fully rootless, &#8211;userns-remap provides similar UID\u00a0mapping.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 07, 2026Vulnerability \/ DevSecOps A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins\u00a0(AuthZ) under specific circumstances. The vulnerability,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":528,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[130,622,1108,394,1107,136,580,1109,332],"class_list":["post-527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-access","tag-attackers","tag-authorization","tag-bypass","tag-cve202634040","tag-docker","tag-gain","tag-host","tag-lets"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=527"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/527\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/528"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}