CVE-2026-28400

Source
https://cve.org/CVERecord?id=CVE-2026-28400
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28400.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-28400
Aliases
  • GHSA-m456-c56c-hh5c
Published
2026-02-27T21:06:12.418Z
Modified
2026-02-28T06:40:51.665009Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Docker Model Runner Unauthenticated Runtime Flag Injection via _configure Endpoint
Details

Docker Model Runner (DMR) is software used to manage, run, and deploy AI models using Docker. Versions prior to 1.0.16 expose a POST /engines/_configure endpoint that accepts arbitrary runtime flags without authentication. These flags are passed directly to the underlying inference server (llama.cpp). By injecting the --log-file flag, an attacker with network access to the Model Runner API can write or overwrite arbitrary files accessible to the Model Runner process. When bundled with Docker Desktop (where Model Runner is enabled by default since version 4.46.0), it is reachable from any default container at model-runner.docker.internal without authentication. In this context, the file overwrite can target the Docker Desktop VM disk (Docker.raw ), resulting in the destruction of all containers, images, volumes, and build history. However, in specific configurations and with user interaction, it is possible to convert this vulnerability in a container escape. The issue is fixed in Docker Model Runner 1.0.16. Docker Desktop users should update to 4.61.0 or later, which includes the fixed Model Runner. A workaround is available. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) blocks container access to Model Runner, preventing exploitation. However, if the Docker Model Runner is exposed to localhost over TCP in specific configurations, the vulnerability is still exploitable.

Database specific
{
    "cwe_ids": [
        "CWE-749"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28400.json"
}
References

Affected packages

Git / github.com/docker/model-runner

Affected ranges

Type
GIT
Repo
https://github.com/docker/model-runner
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.0.16"
        }
    ]
}

Affected versions

cmd/cli/v0.*
cmd/cli/v0.1.43
cmd/cli/v0.1.44
cmd/cli/v0.1.46
cmd/cli/v1.*
cmd/cli/v1.0.0
cmd/cli/v1.0.1
cmd/cli/v1.0.10
cmd/cli/v1.0.11
cmd/cli/v1.0.2
cmd/cli/v1.0.3
cmd/cli/v1.0.4
cmd/cli/v1.0.5
cmd/cli/v1.0.6
cmd/cli/v1.0.7
cmd/cli/v1.0.8
cmd/cli/v1.0.9
v1.*
v1.0.0
v1.0.1
v1.0.10
v1.0.11
v1.0.12
v1.0.13
v1.0.14
v1.0.15
v1.0.2
v1.0.3
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v1.0.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28400.json"