CVE-2026-33997

Source
https://cve.org/CVERecord?id=CVE-2026-33997
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33997.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-33997
Aliases
Downstream
Related
Published
2026-03-31T01:36:51.404Z
Modified
2026-04-10T05:43:00.574472Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Moby: Off-by-one error in plugin privilege validation
Details

Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that differs from the one approved by the user. Plugins that request exactly one privilege are also affected, because no comparison is performed at all. This issue has been patched in version 29.3.1.

Database specific
{
    "cwe_ids": [
        "CWE-193"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33997.json"
}
References

Affected packages

Git / github.com/moby/moby

Affected ranges

Type
GIT
Repo
https://github.com/moby/moby
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "29.3.1"
        }
    ]
}

Affected versions

0.*
0.0.3
api/v1.*
api/v1.52.0
api/v1.52.0-alpha.0
api/v1.52.0-alpha.1
api/v1.52.0-beta.0
api/v1.52.0-beta.1
api/v1.52.0-beta.2
api/v1.52.0-beta.3
api/v1.52.0-beta.4
api/v1.52.0-rc.1
client/v0.*
client/v0.1.0
client/v0.1.0-alpha.0
client/v0.1.0-beta.0
client/v0.1.0-beta.1
client/v0.1.0-beta.2
client/v0.1.0-beta.3
client/v0.1.0-rc.1
docker-v29.*
docker-v29.0.0
docker-v29.0.0-rc.1
docker-v29.0.0-rc.2
docker-v29.0.0-rc.3
docker-v29.0.1
docker-v29.0.2
docker-v29.0.3
docker-v29.0.4
docker-v29.1.3
docker-v29.1.4
docker-v29.1.5
docs-v1.*
docs-v1.12.0-rc4-2016-07-15
upstream/0.*
upstream/0.1.2
upstream/0.1.3
v0.*
v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.2.0
v0.2.1
v0.2.2
v0.3.0
v0.3.1
v0.3.2
v0.4.1
v0.4.2
v0.4.4
v0.4.5
v0.4.7
v0.5.0
v0.6.5
v0.7.0
v0.7.1
v0.7.2
v18.*
v18.06.0-ce-rc1
v18.09.0-ce-tp0
v19.*
v19.03.0-beta1
v19.03.0-beta2
v19.03.0-beta3
v2.*
v2.0.0-beta.0
v2.0.0-beta.1
v2.0.0-beta.2
v2.0.0-beta.3
v20.*
v20.10.0
v20.10.0-beta1
v20.10.0-rc1
v20.10.0-rc2
v20.10.1
v20.10.2
v22.*
v22.06.0-beta.0
v24.*
v24.0.0-beta.1
v24.0.0-beta.2
v24.0.0-rc.1
v24.0.0-rc.2
v25.*
v25.0.0
v25.0.0-beta.1
v25.0.0-beta.2
v25.0.0-beta.3
v25.0.0-rc.1
v25.0.0-rc.2
v25.0.0-rc.3
v26.*
v26.0.0
v26.0.0-rc1
v26.0.0-rc2
v26.0.0-rc3
v26.1.0
v27.*
v27.0.0-rc.1
v27.0.0-rc.2
v27.0.1
v27.0.1-rc.1
v28.*
v28.0.0
v28.0.0-rc.1
v28.0.0-rc.2
v28.0.0-rc.3
v28.0.1
v28.0.2
v28.0.3
v28.0.4
v28.1.0
v28.1.0-rc.1
v28.1.0-rc.2
v28.1.1
v28.2.0
v28.2.0-rc.1
v28.2.0-rc.2
v28.2.1
v28.2.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33997.json"