{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/containerization/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":8.8,"id":"CVE-2026-34040"}],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["containerization","authorization bypass","privilege escalation","cve-2026-34040"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eMoby is an open-source container framework widely used in containerization deployments. A critical security vulnerability, identified as CVE-2026-34040, affects Moby versions prior to 29.3.1. This flaw enables attackers to bypass configured authorization plugins (AuthZ), potentially granting them unauthorized access to container resources and functionalities. Successful exploitation could lead to privilege escalation within the container environment, allowing attackers to execute arbitrary…\u003c/p\u003e\n","date_modified":"2026-03-31T03:15:57Z","date_published":"2026-03-31T03:15:57Z","id":"/briefs/2026-03-moby-authz-bypass/","summary":"A security vulnerability in Moby (prior to v29.3.1) allows attackers to bypass authorization plugins, potentially leading to unauthorized container access and privilege escalation.","title":"Moby Authorization Plugin Bypass Vulnerability (CVE-2026-34040)","url":"https://feed.craftedsignal.io/briefs/2026-03-moby-authz-bypass/"}],"language":"en","title":"CraftedSignal Threat Feed — Containerization","version":"https://jsonfeed.org/version/1.1"}