Authorization Plugin Bypass Vulnerability in Moby by Moby Inc.
CVE-2026-34040

8.8HIGH

Key Information:

Vendor

Moby

Status
Vendor
CVE Published:
31 March 2026

Badges

πŸ“ˆ Score: 198πŸ“° News Worthy

What is CVE-2026-34040?

CVE-2026-34040 is a vulnerability identified in Moby, an open-source container framework widely used for developing, running, and managing containerized applications. The vulnerability allows attackers to bypass authorization plugins, which are integral to controlling access permissions for various operations within the framework. This could lead to unauthorized actions being performed by malicious actors, potentially affecting the integrity and security of the container applications managed by Moby. Organizations utilizing earlier versions than 29.3.1 are particularly at risk, as the flaw has been addressed in this subsequent release. The implications of this vulnerability are concerning, especially for enterprises that rely on containerization for their applications and services.

Potential impact of CVE-2026-34040

  1. Unauthorized Access: The most immediate threat posed by this vulnerability is the potential for attackers to gain unauthorized access to systems. They could perform operations that typical users would not have permissions for, compromising sensitive data or configurations.

  2. Data Integrity Compromise: The ability to bypass authorization controls may allow malicious users to alter or delete critical data within containerized environments. This can result in data corruption, loss, or manipulation, severely impacting business operations.

  3. Operational Disruption: Exploitation of the vulnerability could lead to disruptions in services offered by applications running on Moby. Such disruptions could not only affect internal operations but also lead to reputational damage and loss of customer trust if services become unreliable or are compromised.

Affected Version(s)

moby < 29.3.1

News Articles

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

Docker CVE-2026-34040 enables AuthZ bypass via padded requests, risking host compromise; fixed in version 29.3.1.

1 week ago

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • πŸ“°

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

.