CVE-2026-33990
Published: 01 April 2026
Summary
CVE-2026-33990 is a critical-severity SSRF (CWE-918) vulnerability in Docker Model Runner. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
This vulnerability is AI-related — categorised as Other AI Platforms.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of untrusted inputs such as the realm URL from the OCI registry's WWW-Authenticate header to block SSRF by checking scheme, hostname, and IP range.
Enforces information flow policies that prevent the Model Runner from accessing internal services like localhost based on approved flow control rules.
Monitors and controls communications at system boundaries to limit SSRF requests from reaching or exfiltrating data from internal services.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in DMR enables remote exploitation of the application (T1190) to probe and discover internal network services (T1046), gather system information via responses (T1082), and access data from internal services/repositories (T1213).
NVD Description
Docker Model Runner (DMR) is software used to manage, run, and deploy AI models using Docker. Prior to version 1.1.25, Docker Model Runner contains an SSRF vulnerability in its OCI registry token exchange flow. When pulling a model, Model Runner…
more
follows the realm URL from the registry's WWW-Authenticate header without validating the scheme, hostname, or IP range. A malicious OCI registry can set the realm to an internal URL (e.g., http://127.0.0.1:3000/), causing Model Runner running on the host to make arbitrary GET requests to internal services and reflect the full response body back to the caller. Additionally, the token exchange mechanism can relay data from internal services back to the attacker-controlled registry via the Authorization: Bearer header. This issue has been patched in version 1.1.25. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) blocks container access to Model Runner, preventing exploitation. However, if the Docker Model Runner is exposed to localhost over TCP in specific configurations, the vulnerability is still exploitable.
Deeper analysisAI
Docker Model Runner (DMR), a software component for managing, running, and deploying AI models using Docker, contains a Server-Side Request Forgery (SSRF) vulnerability, identified as CVE-2026-33990, in versions prior to 1.1.25. The flaw resides in the OCI registry token exchange flow, where DMR blindly follows the realm URL specified in the registry's WWW-Authenticate header without validating the scheme, hostname, or IP range. This allows a malicious registry to redirect requests to arbitrary internal endpoints.
Attackers can exploit this vulnerability remotely with no privileges or user interaction required, as indicated by its CVSS score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). By controlling an OCI registry and tricking a victim into pulling a model from it, an attacker can force the Model Runner on the host to issue arbitrary GET requests to internal services, such as http://127.0.0.1:3000/. The full response body from these internal services is reflected back to the attacker, enabling reconnaissance. Additionally, the token exchange process can relay data from internal services to the attacker-controlled registry via the Authorization: Bearer header, potentially compromising sensitive information and enabling further integrity violations.
The GitHub security advisory (GHSA-x2f5-332j-9xwq) confirms the issue has been patched in Docker Model Runner version 1.1.25. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) prevents container access to Model Runner, mitigating exploitation. However, in configurations where Model Runner is exposed to localhost over TCP, the vulnerability remains exploitable even with these measures.
This vulnerability is particularly relevant in AI/ML workflows, as DMR is designed specifically for handling AI model deployments via Docker, potentially exposing internal infrastructure in machine learning pipelines to external threats. No real-world exploitation has been reported in the provided details.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: ai