Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2857 articles · 109425 vulns · 38/41 feeds (7d)
← Back to list
8.2
CVE-2026-34045EXPLOITEDPATCHED
red hat · podman

Podman Desktop WebView Server Exposed

Description

Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger denial-of-service conditions and extract sensitive information. By abusing missing connection limits and timeouts, an attacker can exhaust file descriptors and kernel memory, leading to application crash or full host freeze. Additionally, verbose error responses disclose internal paths and system details (including usernames on Windows), aiding further exploitation. The issue requires no authentication or user interaction and is exploitable over the network. This vulnerability is fixed in 1.26.2.

Affected Products

VendorProductVersions
red hatpodman< 1.26.2

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
open sourcepodmancert_advisory90%

References

  • https://github.com/podman-desktop/podman-desktop/security/advisories/GHSA-2q88-39rh-gxvv(x_refsource_CONFIRM)

Related News (2 articles)

Tier B
BSI Advisories1d ago
[NEU] [hoch] Podman Desktop: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen
→ No new info (linked only)
Tier C
VulDB1d ago
CVE-2026-34045 | podman-desktop Podman Desktop up to 1.26.1 on Windows allocation of file descriptors or handles without limits or throttling
→ No new info (linked only)
CVSS 3.18.2 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
1.26.2
CWECWE-209, CWE-400, CWE-284
PublishedApr 7, 2026
Last enriched1d agov2
Trending Score66
Source articles2
Independent2
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-4634EXP
Keycloak: keycloak: denial of service via excessive processing of openid connect scope parameters
Trending: 48
HIGHCVE-2026-4636EXP
Keycloak: keycloak: uma policy bypass allows authenticated users to gain unauthorized access to victim-owned resources.
Trending: 46
NONECVE-2026-4282EXP
Keycloak: keycloak: privilege escalation via forged authorization codes due to singleuseobjectprovider isolation flaw
Trending: 39
NONECVE-2026-3872EXP
Keycloak: keycloak: information disclosure due to redirect_uri validation bypass
Trending: 39
NONECVE-2025-57853
Web-terminal: privilege escalation via excessive /etc/passwd permissions
Trending: 36

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 7, 2026
Discovered by ZDM
Apr 7, 2026
Updated: severity, activelyExploited, patchAvailable
Apr 7, 2026
Actively Exploited
Apr 8, 2026
Patch Available
Apr 8, 2026

Version History

v2
Last enriched 1d ago
v2Tier C1d ago

Updated severity to CRITICAL, marked as actively exploited, and specified patch available in version 1.26.2.

severityactivelyExploitedpatchAvailable
via VulDB
v11d ago

Initial creation