Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-5817
PUBLISHED
More InfoOfficial Page
Assigner-Docker
Assigner Org ID-686469e6-3ff6-451b-ab8b-cf5b9e89401e
View Known Exploited Vulnerability (KEV) details
Published At-22 May, 2026 | 19:24
Updated At-22 May, 2026 | 19:24
Rejected At-
▼CVE Numbering Authority (CNA)
Docker Model Runner container-to-host code execution via unsandboxed trust_remote_code in Python inference backends

The vllm-metal inference backend in Docker Model Runner on macOS unconditionally sets trust_remote_code=True when loading model tokenizers, and runs without sandboxing. This causes transformers.AutoTokenizer.from_pretrained() to import and execute arbitrary Python files included in any model pulled from an OCI registry, resulting in arbitrary code execution on the Docker host as the Docker Desktop user when inference is triggered. Any container on the Docker network can trigger this by calling the model-runner.docker.internal API to pull a malicious model and request inference.

Affected Products
Vendor
Docker, Inc.Docker
Product
Docker Desktop
Platforms
  • MacOS
Default Status
unaffected
Versions
Affected
  • From 4.62.0 before 4.68.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-829CWE-829: Inclusion of Functionality from Untrusted Control Sphere
Type: CWE
CWE ID: CWE-829
Description: CWE-829: Inclusion of Functionality from Untrusted Control Sphere
Metrics
VersionBase scoreBase severityVector
4.08.8HIGH
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
3.18.2HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Version: 4.0
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-480CAPEC-480 Escaping Virtualization
CAPEC ID: CAPEC-480
Description: CAPEC-480 Escaping Virtualization
Solutions

Configurations

Docker Model Runner enabled with the vllm-metal inference backend on macOS

Workarounds

Disable Docker Model Runner or only run trusted containers on Docker Desktop instances where Model Runner is enabled.

Exploits

Credits

finder
David Rochester (@davidrxchester)
finder
Nicholas Gould (@gouldnicholas)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.docker.com/desktop/release-notes/#4680
release-notes
Hyperlink: https://docs.docker.com/desktop/release-notes/#4680
Resource:
release-notes
Details not found