ID:12270 - Exploit for Permissions, Privileges, and Access Controls in Docker Desktop - CVE-2025-9074
Published: January 9, 2026
Docker Desktop
Link to public exploit:
Vulnerability description
The vulnerability allows a malicious container to execute arbitrary code on the system.
The vulnerability exists due to improperly imposed security restrictions. A malicious container can access the Docker Engine and launch additional containers without requiring the Docker socket to be mounted, leading to unauthorized access to files on the host system.