Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9m43-p3cx-w8j5 | malcontent OCI image pull credential exfiltration via malicious registry token realm |
Fri, 20 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chainguard
Chainguard malcontent |
|
| CPEs | cpe:2.3:a:chainguard:malcontent:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Chainguard
Chainguard malcontent |
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chainguard-dev
Chainguard-dev malcontent |
|
| Vendors & Products |
Chainguard-dev
Chainguard-dev malcontent |
Thu, 29 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference. malcontent uses google/go-containerregistry for OCI image pulls, which by default uses the Docker credential keychain. A malicious registry could return a `WWW-Authenticate` header redirecting token authentication to an attacker-controlled endpoint, causing credentials to be sent to that endpoint. Version 1.20.3 fixes the issue by defaulting to anonymous auth for OCI pulls. | |
| Title | malcontent's OCI image scanning could expose registry credentials | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-29T21:40:17.926Z
Reserved: 2026-01-27T14:51:03.059Z
Link: CVE-2026-24845
Updated: 2026-01-29T21:39:51.850Z
Status : Analyzed
Published: 2026-01-29T22:15:54.583
Modified: 2026-02-20T20:24:15.000
Link: CVE-2026-24845
No data.
OpenCVE Enrichment
Updated: 2026-04-18T01:30:16Z
Github GHSA