Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2131 articles · 105943 vulns · 36/41 feeds (7d)
← Back to list
5.3
CVE-2026-34040EXPLOITEDPATCHED
null · docker

Moby has AuthZ plugin bypass when provided oversized request bodies

Description

## Summary A security vulnerability has been detected that allows attackers to bypass [authorization plugins (AuthZ)](https://docs.docker.com/engine/extend/plugins_authorization/) under specific circumstances. The base likelihood of this being exploited is low. This is an incomplete fix for [CVE-2024-41110](https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq). ## Impact **If you don't use AuthZ plugins, you are not affected.** Using a specially-crafted API request, an attacker could make the Docker daemon forward the request to an authorization plugin without the body. The authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. Anyone who depends on authorization plugins that introspect the request body to make access control decisions is potentially impacted. ## Workarounds If unable to update immediately: - Avoid using AuthZ plugins that rely on request body inspection for security decisions. - Restrict access to the Docker API to trusted parties, following the principle of least privilege. ## Credits - 1seal / Oleh Konko ([@1seal](https://github.com/1seal)) - Cody (c@wormhole.guru) - Asim Viladi Oglu Manizada (@manizada) ## Resources - [CVE-2024-41110 / GHSA-v23v-6jw2-98fq](https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq)

Affected Products

VendorProductVersions
nulldockergo/github.com/moby/moby: < 29.3.1, go/github.com/docker/docker: < 29.3.1, go/github.com/moby/moby/v2: < 2.0.0-beta.8

References

  • https://github.com/advisories/GHSA-x744-4wpc-v9h2(advisory)
  • https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq
  • https://github.com/moby/moby/security/advisories/GHSA-x744-4wpc-v9h2
  • https://github.com/moby/moby/commit/e89edb19ad7de0407a5d31e3111cb01aa10b5a38
  • https://docs.docker.com/engine/extend/plugins_authorization
  • https://github.com/advisories/GHSA-x744-4wpc-v9h2

Related News (1 articles)

Tier C
VulDB2d ago
CVE-2026-34040 | docker/moby authorization
→ No new info (linked only)
CVSS 3.15.3 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited✅ Yes
Patch availablegithub.com/moby/moby/v2@2.0.0-beta.8
CWECWE-863, CWE-285, CWE-266
PublishedMar 27, 2026
Last enriched2d agov2
Tags
GHSA-x744-4wpc-v9h2go
Trending Score28
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-34070EXP
LangChain Core has Path Traversal vulnerabilites in legacy `load_prompt` functions
Trending: 38
NONECVE-2018-25225EXP
SIPP 3.3 Stack-Based Buffer Overflow via Configuration File
Trending: 37
CRITICALCVE-2026-28505EXP
Tautulli: RCE via eval() sandbox bypass using lambda nested scope to escape co_names whitelist check
Trending: 33
CRITICALCVE-2026-31799
Tautulli: SQL Injection in get_home_stats API endpoint via unsanitised filter parameters
Trending: 31
HIGHCVE-2026-33533
Glances Vulnerable to Cross-Origin System Information Disclosure via XML-RPC Server CORS Wildcard
Trending: 27

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Mar 27, 2026
Actively Exploited
Mar 27, 2026
Patch Available
Mar 27, 2026
Discovered by ZDM
Mar 27, 2026
Updated: severity, cvssEstimate, cweIds, activelyExploited
Mar 28, 2026

Version History

v2
Last enriched 2d ago
v2Tier C2d ago

Updated vendor to 'docker', product to 'moby', severity to 'MEDIUM', CVSS score to 5.3, added new CWE IDs, and marked as actively exploited.

severitycvssEstimatecweIdsactivelyExploited
via VulDB
v13d ago

Initial creation