Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation podman Desktop |
|
| CPEs | cpe:2.3:a:linuxfoundation:podman_desktop:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation podman Desktop |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 30 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-305 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Podman-desktop
Podman-desktop podman-desktop |
|
| Vendors & Products |
Podman-desktop
Podman-desktop podman-desktop |
Wed, 28 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Podman Desktop is a graphical tool for developing on containers and Kubernetes. A critical authentication bypass vulnerability in Podman Desktop prior to version 1.25.1 allows any extension to completely circumvent permission checks and gain unauthorized access to all authentication sessions. The `isAccessAllowed()` function unconditionally returns `true`, enabling malicious extensions to impersonate any user, hijack authentication sessions, and access sensitive resources without authorization. This vulnerability affects all versions of Podman Desktop. Version 1.25.1 contains a patch for the issue. | |
| Title | Podman Desktop Extension System Vulnerable to Authentication Bypass | |
| Weaknesses | CWE-285 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-28T21:21:17.125Z
Reserved: 2026-01-27T14:51:03.058Z
Link: CVE-2026-24835
Updated: 2026-01-28T21:21:12.764Z
Status : Analyzed
Published: 2026-01-28T21:16:12.947
Modified: 2026-03-02T18:27:31.420
Link: CVE-2026-24835
OpenCVE Enrichment
Updated: 2026-04-18T01:45:33Z