SSRF Vulnerability in Docker Model Runner Affecting Docker Software
CVE-2026-33990

6.8MEDIUM

Key Information:

Vendor

Docker

Vendor
CVE Published:
1 April 2026

What is CVE-2026-33990?

The Docker Model Runner, prior to version 1.1.25, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability within its OCI registry token exchange workflow. In scenarios where Model Runner pulls a model, it adheres to the realm URL specified in the registry's WWW-Authenticate header without conducting thorough validation on the scheme, hostname, or IP range. This loophole allows a malicious OCI registry to propose an internal URL (such as http://127.0.0.1:3000/), which may trigger Model Runner running on the host to execute arbitrary GET requests to internal services. The response body from these requests can be fully reflected back to the initial caller. Moreover, the existing token exchange mechanism can inadvertently forward internal service data to an attacker-controlled registry via the Authorization: Bearer header. Though this vulnerability is addressed in version 1.1.25, Docker Desktop users can enhance their security posture by activating Enhanced Container Isolation (ECI), which restricts container access to Model Runner, mitigating exploitation risks. However, if Docker Model Runner is inadvertently exposed to localhost over TCP in specific configurations, the vulnerability remains a potential risk.

Affected Version(s)

model-runner < 1.1.25

References

CVSS V4

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.