Cyber Posture

CVE-2026-33414

High

Published: 14 April 2026

Published
14 April 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0001 2.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33414 is a high-severity OS Command Injection (CWE-78) vulnerability in Podman Project Podman. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique PowerShell (T1059.001); ranked at the 2.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to PowerShell (T1059.001) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and patching of the command injection flaw in Podman versions 4.8.0 through 5.8.1, directly mitigating exploitation via the available fix in 5.8.2.

prevent

Mandates validation and sanitization of untrusted VM image path inputs before insertion into PowerShell double-quoted strings, preventing $() subexpression injection.

prevent

Enforces least privilege on the Podman process to limit the scope and impact of arbitrary PowerShell command execution even if injection occurs.

MITRE ATT&CK Enterprise TechniquesAI

T1059.001 PowerShell Execution
Adversaries may abuse PowerShell commands and scripts for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Command injection in Podman HyperV backend enables arbitrary PowerShell subexpression execution (T1059.001) from low-privileged local context, directly resulting in SYSTEM-level code execution via exploitation for privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization,…

more

allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.

Deeper analysisAI

CVE-2026-33414 is a command injection vulnerability in Podman, a tool for managing OCI containers and pods. It affects versions 4.8.0 through 5.8.1, specifically in the HyperV machine backend located at pkg/machine/hyperv/stubber.go. The issue arises when the VM image path is inserted unsanitized into a PowerShell double-quoted string, enabling $() subexpression injection. PowerShell evaluates these subexpressions before executing the outer command, and the vulnerability is exclusive to Windows due to the HyperV backend dependency. The CVSS v3.1 base score is 7.8 (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H), mapped to CWE-78 (Improper Neutralization of Special Elements used in an OS Command).

An attacker with local access and low privileges (PR:L) can exploit this by controlling the VM image path, such as through a crafted machine name or image directory. This allows injection of arbitrary PowerShell commands executed with the privileges of the Podman process. On typical Windows installations, this grants SYSTEM-level code execution, providing high confidentiality, integrity, and availability impacts in a scoped attack (S:C). The high attack complexity (AC:H) stems from the need to manipulate the specific path context.

Podman has addressed the vulnerability in version 5.8.2. The patch commit is available at https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc654ed, and further details are in the security advisory at https://github.com/containers/podman/security/advisories/GHSA-hc8w-h2mf-hp59. Security practitioners should upgrade to 5.8.2 or later on affected Windows systems running Podman.

Details

CWE(s)

Affected Products

podman project
podman
4.8.0 — 5.8.2

CVEs Like This One

CVE-2026-31994Same product: Microsoft Windows
CVE-2026-32948Same product: Microsoft Windows
CVE-2025-23316Same product: Microsoft Windows
CVE-2025-69269Same product: Microsoft Windows
CVE-2026-21267Same product: Microsoft Windows
CVE-2026-32191Same vendor: Microsoft
CVE-2026-2123Same product: Microsoft Windows
CVE-2025-12744Shared CWE-78
CVE-2025-25269Shared CWE-78
CVE-2026-5967Shared CWE-78

References