Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hc8w-h2mf-hp59 | PowerShell Command Injection in Podman HyperV Machine |
Thu, 23 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Podman Project Podman Project podman |
|
| CPEs | cpe:2.3:a:podman_project:podman:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Podman Project Podman Project podman |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 15 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Containers
Containers podman |
|
| Vendors & Products |
Containers
Containers podman |
Tue, 14 Apr 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2. | |
| Title | PowerShell Command Injection in Podman HyperV Machine | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-16T13:57:28.317Z
Reserved: 2026-03-19T17:02:34.171Z
Link: CVE-2026-33414
Updated: 2026-04-16T13:57:11.596Z
Status : Analyzed
Published: 2026-04-14T23:16:27.987
Modified: 2026-04-23T17:49:13.107
Link: CVE-2026-33414
OpenCVE Enrichment
Updated: 2026-04-16T09:15:30Z
Github GHSA