ID:11929 - Exploit for Permissions, Privileges, and Access Controls in Docker Desktop - CVE-2025-9074
Published: September 5, 2025
Docker Desktop
Link to public exploit:
Vulnerability description
The vulnerability allows a malicious container to execute arbitrary code on the system.
The vulnerability exists due to improperly imposed security restrictions. A malicious container can access the Docker Engine and launch additional containers without requiring the Docker socket to be mounted, leading to unauthorized access to files on the host system.