<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-44848 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44848/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 16:29:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44848/feed.xml" rel="self" type="application/rss+xml"/><item><title>Portainer Missing Authorization on Docker Plugin Endpoints Leads to Host RCE (CVE-2026-44848)</title><link>https://feed.craftedsignal.io/briefs/2026-05-portainer-rce/</link><pubDate>Thu, 14 May 2026 16:29:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-portainer-rce/</guid><description>Portainer versions 2.33.0 through 2.33.7, 2.39.0 through 2.39.1, and 2.40.0 expose a missing authorization vulnerability (CVE-2026-44848) on the Docker plugin management endpoints, allowing a non-admin user with access to a Docker endpoint to install and enable arbitrary Docker plugins from any registry, ultimately leading to root privileges on the Docker host and unauthorized file system access.</description><content:encoded><![CDATA[<p>Portainer, a web-based management UI for Docker, has a critical missing authorization vulnerability (CVE-2026-44848) affecting versions 2.33.0-2.33.7, 2.39.0-2.39.1, and 2.40.0. This flaw allows a standard (non-admin) user with access to a Docker endpoint to bypass Role-Based Access Control (RBAC) and directly interact with the Docker daemon&rsquo;s plugin management endpoints.  Specifically, the <code>/plugins/*</code> endpoints were not properly registered with an authorization handler. This oversight enables a malicious user to install, enable, and execute arbitrary Docker plugins, gaining root-level privileges on the underlying Docker host. This vulnerability was reported on 2026-03-16 and patched in subsequent releases, highlighting the importance of timely updates for Portainer deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A non-admin user authenticates to Portainer with access to a Docker endpoint.</li>
<li>The user crafts a <code>POST</code> request to the <code>/plugins/pull</code> endpoint, specifying a malicious Docker plugin from a public or private registry.</li>
<li>Portainer forwards the request to the Docker daemon without proper authorization checks, bypassing RBAC.</li>
<li>Docker pulls the specified plugin image from the registry.</li>
<li>The user crafts a <code>POST</code> request to the <code>/plugins/{name}/enable</code> endpoint to enable the pulled plugin.</li>
<li>Again, Portainer forwards the request to the Docker daemon without authorization.</li>
<li>Docker enables the plugin, granting it requested privileges such as <code>CAP_SYS_ADMIN</code> and host-path mounts.</li>
<li>The malicious Docker plugin executes with root privileges on the Docker host, allowing the user to read and modify files, effectively gaining complete control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows an attacker with limited Portainer privileges to achieve root-level access on the Docker host. The attacker can then read and modify sensitive data, install malware, or disrupt services. Given the widespread use of Portainer in managing Docker environments, a successful exploit could lead to significant data breaches, system compromise, and operational disruption.  Organizations using vulnerable Portainer versions are at high risk and should apply the provided patches or workarounds immediately.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Upgrade Portainer:</strong> Immediately upgrade to the latest version of your supported branch (2.33.8, 2.39.2, or 2.41.0) to address the vulnerability as indicated in the advisory.</li>
<li><strong>Apply Workaround:</strong> As an interim measure, revoke Docker endpoint access for non-admin users via Portainer RBAC until the patched release is deployed as suggested in the &ldquo;Workarounds&rdquo; section.</li>
<li><strong>Monitor Docker API Access:</strong> Implement network monitoring to detect unauthorized access to the Docker API, focusing on <code>/plugins/*</code> endpoints, to catch potential exploit attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>execution</category><category>CVE-2026-44848</category></item></channel></rss>