Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2146 articles · 105971 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-33990PATCHED
go · github.com/docker/model-runner

Docker Model Runner OCI Registry Client Vulnerable to Server-Side Request Forgery (SSRF)

Description

## Summary Docker Model Runner contains an SSRF vulnerability in its OCI registry token exchange flow. When pulling a model, Model Runner follows the realm URL from the registry's `WWW-Authenticate` header without validating the scheme, hostname, or IP range. A malicious OCI registry can set the realm to an internal URL (e.g., `http://127.0.0.1:3000/`), causing Model Runner running on the host to make arbitrary GET requests to internal services and reflect the full response body back to the caller. Additionally, the token exchange mechanism can relay data from internal services back to the attacker-controlled registry via the `Authorization: Bearer` header. ## Patches Fixed in Docker Model Runner v1.1.25 Docker Desktop users should update to 4.67.0 or later, which includes the fixed Model Runner. ## Workarounds For Docker Desktop users, enabling Enhanced Container Isolation (ECI) blocks container access to Model Runner, preventing exploitation. However, if the Docker Model Runner is exposed to localhost over TCP in specific configurations, the vulnerability is still exploitable. ## Impact An unprivileged container or a malicious OCI registry that the user performed a pull from might issue GET requests to host-local services (localhost, internal network)

Affected Products

VendorProductVersions
gogithub.com/docker/model-runnergo/github.com/docker/model-runner: < 1.1.25

References

  • https://github.com/advisories/GHSA-x2f5-332j-9xwq(advisory)
  • https://github.com/docker/model-runner/security/advisories/GHSA-x2f5-332j-9xwq
  • https://github.com/advisories/GHSA-x2f5-332j-9xwq

Related News (2 articles)

Tier B
CCCS Canada13h ago
Docker security advisory (AV26–301)
→ No new info (linked only)
Tier B
CERT-FR1d ago
Vulnérabilité dans Docker Desktop (30 mars 2026)
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch availablegithub.com/docker/model-runner@1.1.25
CWECWE-918
PublishedMar 30, 2026
Tags
GHSA-x2f5-332j-9xwqgo
Trending Score33
Source articles2
Independent2
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-33032EXP
Nginx UI: Unauthenticated MCP Endpoint Allows Remote Nginx Takeover
Trending: 69
MEDIUMCVE-2026-33027EXP
Nginx UI: Improper Path Validation Allows Recursive Deletion of the Nginx Configuration Directory
Trending: 58
HIGHCVE-2026-33028EXP
Nginx UI: Race Condition Leads to Persistent Data Corruption and Service Collapse
Trending: 52
HIGHCVE-2026-33030
Nginx UI: Unencrypted Storage of DNS API Tokens and ACME Private Keys
Trending: 26
NONECVE-2026-34041EXP
act: Unrestricted set-env and add-path command processing enables environment injection
Trending: 25

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Mar 30, 2026
Patch Available
Mar 30, 2026
Discovered by ZDM
Mar 30, 2026