Arbitrary Code Execution Vulnerability in Docker Model Runner for macOS
CVE-2026-5843
8.8HIGH
What is CVE-2026-5843?
The Docker Model Runner on macOS contains a serious vulnerability in the MLX inference backend, specifically due to its handling of model files. By using the MLX-LM library, the model runner can import and execute arbitrary Python files located in model directories without appropriate checks. This is particularly concerning as it allows for the execution of untrusted code from the specified model_file within config.json, leading to the potential compromise of the Docker host environment. Any Docker container can exploit this vulnerability by making requests to the model-runner.docker.internal API to execute models from unsecure sources.
Affected Version(s)
Docker Desktop MacOS 4.56.0 < 4.71.0
References
CVSS V4
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
David Rochester (@davidrxchester)
Nicholas Gould (@gouldnicholas)
