Docker Vulnerability Let Attackers Bypass Authorization and Gain Host Access

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A newly discovered high-severity vulnerability in Docker Engine could allow attackers to bypass authorization plugins and potentially gain unauthorized access to the underlying host system.

Tracked as CVE-2026-34040, this security flaw stems from an incomplete patch for a previously known vulnerability, leaving specific Docker configurations exposed to exploitation.

In enterprise environments, administrators frequently use Docker authorization plugins (AuthZ) to control access to the Docker API.

These plugins act as gatekeepers, inspecting the body of incoming API requests to determine if a user has permission to perform specific actions.

Security researchers discovered that an attacker can bypass these checks using a specially crafted API request with an oversized body.

When this oversized request is processed, the Docker daemon forwards the request to the AuthZ plugin but drops the body entirely.

Without the body to inspect, the authorization plugin fails to detect the malicious payload. It approves a request it should have denied.

This vulnerability is recognized as an incomplete fix for CVE-2024-41110, an older flaw that exhibited similar authorization bypass behavior.

This vulnerability is classified as “High” severity with a CVSS v3.1 profile indicating that an attacker needs only local access and low privileges to execute the exploit.

Low complexity, no user interaction, exploitation can escape containers and compromise the host system. Fortunately, the base likelihood of this exploit occurring in the wild remains low.

The impact is strictly limited to environments that depend on authorization plugins to introspect request bodies for access control decisions.

If your infrastructure does not use AuthZ plugins, your Docker instances are completely unaffected by this vulnerability. The Docker development team has resolved this vulnerability with the release of Docker Engine version 29.3.1, as noted on GitHub.

System administrators and security teams are strongly encouraged to upgrade to this patched version immediately to secure their infrastructure.

For organizations that cannot deploy the update right away, there are effective workarounds available to mitigate the risk:

  • Avoid using AuthZ plugins that rely on request body inspection for making security decisions.
  • Restrict access to the Docker API to trusted parties only.
  • Enforce the principle of least privilege across all container environments to reduce the chances of a successful local attack.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.