CVE-2026-24835
Vulnerability
CVE-2026-24835
podman-desktop: Podman Desktop: Authentication bypass allows malicious extensions to gain unauthorized access.
ecosystem: redhat:10A flaw was found in Podman Desktop, where an authentication bypass vulnerability allows any malicious extension to completely circumvent permission checks. By exploiting a flaw where the `isAccessAllowed()` function unconditionally returns `true`, an attacker can gain unauthorized access to all authentication sessions. This enables malicious extensions to impersonate any user, hijack authentication sessions, and access sensitive resources without authorization.
References
- secalert@redhat.com: https://access.redhat.com/security/cve/CVE-2026-24835
- secalert@redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2434657
- secalert@redhat.com: https://drive.google.com/file/d/1ib4RG34mGHDlXeyib8L2j9L5rEDxuDM5/view?usp=sharing
- secalert@redhat.com: https://github.com/podman-desktop/podman-desktop/security/advisories/GHSA-v3fx-qg34-6g9m
- secalert@redhat.com: https://nvd.nist.gov/vuln/detail/CVE-2026-24835
- secalert@redhat.com: https://www.cve.org/CVERecord?id=CVE-2026-24835
type: vendor
source: secalert@redhat.com
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
| AV | Local | |
|---|---|---|
| AC | Low | |
| PR | Low | |
| UI | Required | |
| S | Not Changed | |
| C | High | |
| I | High | |
| A | None |
source: secalert@redhat.com
Authentication Bypass by Primary Weakness
source: secalert@redhat.com
published: 2026-01-28 20:42:29
modified: 2026-01-30 09:33:57
Detection
redhat-vex
OR
 
podman-desktop
package type: source
tag: rhel-10:d3227f4a-4aa3-52fc-a88c-ed078ae3ab17
Data Sources
- RedHat Enterprise Linux CSAF VEX
redhat-vex