By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
Computing

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

News Room
Last updated: 2026/04/07 at 12:12 PM
News Room Published 7 April 2026
Share
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
SHARE

Ravie LakshmananApr 07, 2026Vulnerability / DevSecOps

A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances.

The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incomplete fix for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July 2024.

“Using a specially-crafted API request, an attacker could make the Docker daemon forward the request to an authorization plugin without the body,” Docker Engine maintainers said in an advisory released late last month. “The authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.”

“Anyone who depends on authorization plugins that introspect the request body to make access control decisions is potentially impacted.”

Multiple security vulnerabilities, including Asim Viladi Oglu Manizada, Cody, Oleh Konko, and Vladimir Tokarev, have been credited with independently discovering and reporting the bug. The issue has been patched in Docker Engine version 29.3.1.

According to a report published by Cyera Research Labs researcher Tokarev, the vulnerability stems from the fact that the fix for CVE-2024-41110 did not properly handle oversized HTTP request bodies, thereby opening the door to a scenario where a single padded HTTP request can be used to create a privileged container with host file system access.

In a hypothetical attack scenario, an attacker who has Docker API access restricted by an AuthZ plugin can undermine the mechanism by padding a container creation request to more than 1MB, causing it to be dropped before reaching the plugin.

“The plugin allows the request because it sees nothing to block,” Tokarev said in a report shared with The Hacker News. “The Docker daemon processes the full request and creates a privileged container with root access to the host: your AWS credentials, SSH keys, Kubernetes configs, and everything else on the machine. This works against every AuthZ plugin in the ecosystem.”

What’s more, an artificial intelligence (AI) coding agent like OpenClaw running inside a Docker-based sandbox can be tricked into executing a prompt injection concealed within a specifically crafted GitHub repository as part of a regular developer workflow, resulting in the execution of malicious code that exploits CVE-2026-34040 to bypass authorization using the above approach and create a privileged container and mount the host file system.

With this level of access in place, the attacker can extract credentials for cloud services, and abuse them to take control of cloud accounts, Kubernetes clusters, and even SSH into production servers.

It doesn’t end there. Cyera also cautioned that AI agents can figure out the bypass on their own and trigger it by constructing a padded HTTP request upon encountering errors when attempting to access files like kubeconfig as part of a legitimate debugging task issued by a developer (e.g., debug the K8s out-of-memory issue). This approach eliminates the need for planting a poisoned repository containing the malicious instructions.

“AuthZ plugin denied the mount request,” Cyera explained. “The agent has access to the Docker API and knows how HTTP works. CVE-2026-34040 doesn’t require any exploit code, privilege, or special tools. It’s a single HTTP request with extra padding. Any agent that can read Docker API documentation can construct it.”

As temporary workarounds, it’s recommended to avoid using AuthZ plugins that rely on request body inspection for security decisions, limit access to the Docker API to trusted parties by following the principle of least privilege, or run Docker in rootless mode.

“In rootless mode, even a privileged container’s ‘root’ maps to an unprivileged host UID,” Tokarev said. “The blast radius drops from ‘full host compromise’ to ‘compromised unprivileged user.’ For environments that can’t go fully rootless, –userns-remap provides similar UID mapping.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article PlayStation Store Axes More Shovelware Games, Including Jesus Simulator PlayStation Store Axes More Shovelware Games, Including Jesus Simulator
Next Article 'Daredevil: Born Again' Season 2: What Time Does Episode 4 Come Out? 'Daredevil: Born Again' Season 2: What Time Does Episode 4 Come Out?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Intel QAT Driver With Linux 7.1 Adding Zstd Offload Support
Intel QAT Driver With Linux 7.1 Adding Zstd Offload Support
Computing
Chrome is making some clever changes to tab layout, and now’s your chance to try it
Chrome is making some clever changes to tab layout, and now’s your chance to try it
News
Price war intensifies Amazon targets Chinese sellers TechNode
Price war intensifies Amazon targets Chinese sellers TechNode
Computing
Waymo Opens Driverless Rides to the Public in Nashville
Waymo Opens Driverless Rides to the Public in Nashville
News

You Might also Like

Intel QAT Driver With Linux 7.1 Adding Zstd Offload Support
Computing

Intel QAT Driver With Linux 7.1 Adding Zstd Offload Support

2 Min Read
Price war intensifies Amazon targets Chinese sellers TechNode
Computing

Price war intensifies Amazon targets Chinese sellers TechNode

5 Min Read
Media King picks Nigeria as first stop in Africa’s public WiFi push
Computing

Media King picks Nigeria as first stop in Africa’s public WiFi push

8 Min Read

AI Tools That Are Actually Generating Income in 2026 – Digital Marketing

9 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?