Advisory Details

April 15th, 2026

(0Day) Docker Desktop credentialHelper Directory Traversal Privilege Escalation Vulnerability

ZDI-26-261
ZDI-CAN-27431

CVE ID
CVSS SCORE 7.5, AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
AFFECTED VENDORS Docker
AFFECTED PRODUCTS Desktop
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop. An attacker must first obtain the ability to escape the container and execute high-privileged code within the Docker Hyper-V VM in order to exploit this vulnerability.

The specific flaw exists within the the app/settings endpoint. When parsing the credentialHelper value, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code on the host system in the context of the current user.

ADDITIONAL DETAILS

07/11/25 - ZDI submitted the report to the vendor
08/27/25 - ZDI asked for updates
09/05/25 - the vendor requested technical clarification
09/15/25 - ZDI provided additional details
11/11/25 - the vendor rejected the report because the exploitation required prior privileged access
04/08/26 - ZDI notified the vendor of the intention to publish the case as a  0-day advisory


DISCLOSURE TIMELINE
  • 2025-07-11 - Vulnerability reported to vendor
  • 2026-04-15 - Coordinated public release of advisory
  • 2026-04-15 - Advisory Updated
CREDIT Nitesh Surana (niteshsurana.com) & Nelson William Gamazo Sanchez of Trend Research
BACK TO ADVISORIES