Vulnerability Description
Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Podman Project | Podman | >= 4.8.0, < 5.8.2 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc6Patch
- https://github.com/containers/podman/security/advisories/GHSA-hc8w-h2mf-hp59PatchVendor Advisory
FAQ
What is CVE-2026-33414?
CVE-2026-33414 is a vulnerability with a CVSS score of 7.8 (HIGH). Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the ...
How severe is CVE-2026-33414?
CVE-2026-33414 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33414?
Check the references section above for vendor advisories and patch information. Affected products include: Podman Project Podman, Microsoft Windows.