Vulnerability Description
Podman Desktop is a graphical tool for developing on containers and Kubernetes. A critical authentication bypass vulnerability in Podman Desktop prior to version 1.25.1 allows any extension to completely circumvent permission checks and gain unauthorized access to all authentication sessions. The `isAccessAllowed()` function unconditionally returns `true`, enabling malicious extensions to impersonate any user, hijack authentication sessions, and access sensitive resources without authorization. This vulnerability affects all versions of Podman Desktop. Version 1.25.1 contains a patch for the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Podman Desktop | < 1.25.1 |
Related Weaknesses (CWE)
References
- https://drive.google.com/file/d/1ib4RG34mGHDlXeyib8L2j9L5rEDxuDM5/view?usp=shariPatch
- https://github.com/podman-desktop/podman-desktop/security/advisories/GHSA-v3fx-qExploitVendor Advisory
FAQ
What is CVE-2026-24835?
CVE-2026-24835 is a vulnerability with a CVSS score of 7.1 (HIGH). Podman Desktop is a graphical tool for developing on containers and Kubernetes. A critical authentication bypass vulnerability in Podman Desktop prior to version 1.25.1 allows any extension to complet...
How severe is CVE-2026-24835?
CVE-2026-24835 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24835?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Podman Desktop.