Cyber Posture

CVE-2026-24835

HighPublic PoC

Published: 28 January 2026

Published
28 January 2026
Modified
02 March 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0007 20.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24835 is a high-severity Improper Authorization (CWE-285) vulnerability in Linuxfoundation Podman Desktop. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Steal Application Access Token (T1528); ranked at the 20.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Steal Application Access Token (T1528) and 3 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-285

Documented procedures facilitate correct implementation and ongoing management of authorization decisions.

addresses: CWE-285

Periodic reviews identify and correct flaws in authorization decisions or enforcement.

addresses: CWE-285

The control's documentation requirement reduces improper authorization by ensuring only mission-justified actions bypass authentication.

addresses: CWE-285

Establishing permitted attributes and values, plus auditing changes, ensures authorization decisions are based on correctly managed policy data.

addresses: CWE-285

Explicitly mandates authorizing remote access types before permitting connections, directly mitigating improper authorization.

addresses: CWE-285

The control explicitly requires authorization of each wireless access type prior to permitting connections.

addresses: CWE-285

Mandating explicit authorization of mobile device connections reduces the risk of improper authorization decisions for system access.

addresses: CWE-285

Specifying access authorizations for each account and requiring approvals for account requests enforces proper authorization decisions.

MITRE ATT&CK Enterprise TechniquesAI

T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
T1078.004 Cloud Accounts Stealth
Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Auth bypass (isAccessAllowed always true) directly allows malicious extensions to access/hijack all auth sessions, enabling theft of application tokens/cookies and impersonation via valid cloud accounts.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Podman Desktop is a graphical tool for developing on containers and Kubernetes. A critical authentication bypass vulnerability in Podman Desktop prior to version 1.25.1 allows any extension to completely circumvent permission checks and gain unauthorized access to all authentication sessions.…

more

The `isAccessAllowed()` function unconditionally returns `true`, enabling malicious extensions to impersonate any user, hijack authentication sessions, and access sensitive resources without authorization. This vulnerability affects all versions of Podman Desktop. Version 1.25.1 contains a patch for the issue.

Deeper analysisAI

Podman Desktop, a graphical tool for developing on containers and Kubernetes, contains a critical authentication bypass vulnerability identified as CVE-2026-24835 in versions prior to 1.25.1. The issue stems from the `isAccessAllowed()` function unconditionally returning `true`, which allows any extension to circumvent permission checks and gain unauthorized access to all authentication sessions. This CWE-285 (Improper Authorization) flaw affects all versions of Podman Desktop prior to the patched release of 1.25.1, with a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

A local attacker with low privileges can exploit this vulnerability by installing a malicious extension, requiring low complexity and no user interaction. Successful exploitation enables the attacker to impersonate any user, hijack authentication sessions, and access sensitive resources without authorization, resulting in high impacts to confidentiality and integrity.

Podman Desktop version 1.25.1 addresses the vulnerability with a patch. Additional details are available in the GitHub security advisory at https://github.com/podman-desktop/podman-desktop/security/advisories/GHSA-v3fx-qg34-6g9m and a supplementary document at https://drive.google.com/file/d/1ib4RG34mGHDlXeyib8L2j9L5rEDxuDM5/view?usp=sharing.

Details

CWE(s)

Affected Products

linuxfoundation
podman desktop
≤ 1.25.1

CVEs Like This One

CVE-2026-34045Same product: Linuxfoundation Podman Desktop
CVE-2026-40161Same vendor: Linuxfoundation
CVE-2026-27889Same vendor: Linuxfoundation
CVE-2024-24417Same vendor: Linuxfoundation
CVE-2025-68136Same vendor: Linuxfoundation
CVE-2026-33701Same vendor: Linuxfoundation
CVE-2026-29785Same vendor: Linuxfoundation
CVE-2025-68134Same vendor: Linuxfoundation
CVE-2026-32236Same vendor: Linuxfoundation
CVE-2025-68133Same vendor: Linuxfoundation

References