Authentication Bypass Vulnerability in Podman Desktop by Red Hat
CVE-2026-24835
8.8HIGH
What is CVE-2026-24835?
Podman Desktop, a graphical tool for container and Kubernetes development, contains a vulnerability that allows malicious extensions to bypass authentication checks. This vulnerability enables unauthorized access to sensitive resources, as the isAccessAllowed() function improperly returns true for all requests. Consequently, any extension can impersonate users and hijack authentication sessions. All versions prior to 1.25.1 are affected. Users are encouraged to update to version 1.25.1, which contains the necessary patch to mitigate this issue.
Affected Version(s)
podman-desktop < 1.25.1
