#VU114330 Permissions, Privileges, and Access Controls in Docker Desktop - CVE-2025-9074
Published: August 21, 2025 / Updated: January 9, 2026
Docker Desktop
Docker Inc.
Description
The vulnerability allows a malicious container to execute arbitrary code on the system.
The vulnerability exists due to improperly imposed security restrictions. A malicious container can access the Docker Engine and launch additional containers without requiring the Docker socket to be mounted, leading to unauthorized access to files on the host system.