| CVE ID | |
| CVSS SCORE | 7.5, AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
| AFFECTED VENDORS |
Docker |
| AFFECTED PRODUCTS |
Desktop |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop. An attacker must first obtain the ability to escape the container and execute high-privileged code within the Docker Hyper-V VM in order to exploit this vulnerability. The specific flaw exists within the the app/settings endpoint. When parsing the credentialHelper value, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code on the host system in the context of the current user. |
| ADDITIONAL DETAILS |
07/11/25 - ZDI submitted the report to the vendor |
| DISCLOSURE TIMELINE |
|
| CREDIT | Nitesh Surana (niteshsurana.com) & Nelson William Gamazo Sanchez of Trend Research |