CVE-2026-24835

Vulnerability

CVE-2026-24835

podman-desktop: Podman Desktop: Authentication bypass allows malicious extensions to gain unauthorized access.

ecosystem: redhat:10

A flaw was found in Podman Desktop, where an authentication bypass vulnerability allows any malicious extension to completely circumvent permission checks. By exploiting a flaw where the `isAccessAllowed()` function unconditionally returns `true`, an attacker can gain unauthorized access to all authentication sessions. This enables malicious extensions to impersonate any user, hijack authentication sessions, and access sensitive resources without authorization.

References
severityM
Moderate

type: vendor

source: secalert@redhat.com

CVSS3.1
6.6MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AVLocal
ACLow
PRLow
UIRequired
SNot Changed
CHigh
IHigh
ANone

source: secalert@redhat.com

 CWE
CWE-305

Authentication Bypass by Primary Weakness

source: secalert@redhat.com

published: 2026-01-28 20:42:29

modified: 2026-01-30 09:33:57

Detection

redhat:10
CVE-2026-24835

redhat-vex

OR

unfixedAffected

 

podman-desktop

package type: source

type: version

tag: rhel-10:d3227f4a-4aa3-52fc-a88c-ed078ae3ab17

Data Sources

  • RedHat Enterprise Linux CSAF VEX

    redhat-vex

VulsFutureVuls|GitHub Logo IconGitHub