Arbitrary Code Execution Vulnerability in Docker Model Runner for macOS
CVE-2026-5843

8.8HIGH

Key Information:

Vendor

Docker

Vendor
CVE Published:
22 May 2026

What is CVE-2026-5843?

The Docker Model Runner on macOS contains a serious vulnerability in the MLX inference backend, specifically due to its handling of model files. By using the MLX-LM library, the model runner can import and execute arbitrary Python files located in model directories without appropriate checks. This is particularly concerning as it allows for the execution of untrusted code from the specified model_file within config.json, leading to the potential compromise of the Docker host environment. Any Docker container can exploit this vulnerability by making requests to the model-runner.docker.internal API to execute models from unsecure sources.

Affected Version(s)

Docker Desktop MacOS 4.56.0 < 4.71.0

References

CVSS V4

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

David Rochester (@davidrxchester)
Nicholas Gould (@gouldnicholas)
.