Skip to content
Threat Feed

Vendor

Portainer

6 briefs RSS
high advisory

Portainer JWT Leak via URL Query Parameter

Portainer's authentication middleware accepts JWT bearer tokens passed as the `?token=<JWT>` URL query parameter on any authenticated API endpoint, leading to JWT leakage to logs and referrers, where a leaked token grants the full privileges of the user it was issued to, until the token expires.

Portainer +2 jwt token-leak credential-access CVE-2026-44883
2r 1t
critical advisory

Portainer Endpoint Security Bypass via Docker Swarm Service API

Portainer is vulnerable to an endpoint security bypass via Swarm service create/update, enabling non-admin users with access to a Docker Swarm endpoint to bypass `EndpointSecuritySettings` restrictions and gain elevated privileges such as configuring services with elevated Linux capabilities, disabling syscall filtering and AppArmor confinement, setting arbitrary sysctl values, and mounting arbitrary host paths.

Portainer +3 docker swarm privilege-escalation vulnerability CVE-2026-44849
2r 1t
high advisory

Portainer Bind Mount Restriction Bypass via HostConfig.Mounts (CVE-2026-44850)

Portainer versions 2.33.0 through 2.33.7, 2.39.0 through 2.39.1, and 2.40.0 through 2.40.9 are vulnerable to CVE-2026-44850, a bind-mount restriction bypass via the `HostConfig.Mounts` array allowing regular users to mount host paths into containers and potentially compromise the host filesystem.

Portainer +2 privilege-escalation vulnerability container CVE-2026-44850
2r 1t
high advisory

Portainer Arbitrary File Read via Git Symlink Injection

Portainer is vulnerable to an arbitrary file read vulnerability due to Git symlink injection when deploying stacks from Git repositories, allowing authenticated users to read sensitive files accessible to the Portainer process.

Portainer CE +1 git symlink file-read portainer cve-2026-44881 vulnerability
2r 5t
high advisory

Portainer Kubernetes Authorization Bypass Vulnerability (CVE-2026-44882)

Portainer versions 2.33.0 through 2.33.7 are vulnerable to an authorization bypass in the `kubeClientMiddleware` component, allowing users with valid Portainer sessions to bypass Kubernetes authorization checks and access Kubernetes API endpoints on environments that their role should not permit (CVE-2026-44882).

Portainer authorization kubernetes privilege-escalation
2r 1t
critical advisory

Portainer Missing Authorization on Docker Plugin Endpoints Leads to Host RCE (CVE-2026-44848)

Portainer versions 2.33.0 through 2.33.7, 2.39.0 through 2.39.1, and 2.40.0 expose a missing authorization vulnerability (CVE-2026-44848) on the Docker plugin management endpoints, allowing a non-admin user with access to a Docker endpoint to install and enable arbitrary Docker plugins from any registry, ultimately leading to root privileges on the Docker host and unauthorized file system access.

Portainer +3 privilege-escalation execution CVE-2026-44848
2r 1t