Description
malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference. malcontent uses google/go-containerregistry for OCI image pulls, which by default uses the Docker credential keychain. A malicious registry could return a `WWW-Authenticate` header redirecting token authentication to an attacker-controlled endpoint, causing credentials to be sent to that endpoint. Version 1.20.3 fixes the issue by defaulting to anonymous auth for OCI pulls.
Published: 2026-01-29
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Credential Exposure
Action: Patch Immediately
AI Analysis

Impact

The vulnerability allows malcontent, a supply‑chain analysis tool, to send Docker registry credentials to an attacker‑controlled token endpoint during an OCI image scan. By using the default Docker credential keychain from google/go‑containerregistry, a malicious registry can include a WWW‑Authenticate header that redirects authentication to an external URL. When malcontent follows this redirect, the credentials it has stored for the registry are transmitted to the attacker, exposing them. This is a direct credential exposure flaw (CWE‑522) with no exploitation of code execution or privilege escalation.

Affected Systems

The product affected is Chainguard‑dev’s malcontent. Versions starting at 0.10.0 and continuing through 1.20.2 are vulnerable, as they use default authentication. The fix is introduced in version 1.20.3, which defaults to anonymous pulls and therefore does not send credentials. No other vendors are listed.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate risk. The EPSS score of less than 1% shows a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the attacker to control or influence a registry’s authentication response and supply a specially crafted OCI image reference to malcontent. Attackers with such access can obtain stored registry credentials, potentially granting further access to protected images or infrastructure.

Generated by OpenCVE AI on April 18, 2026 at 01:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade malcontent to version 1.20.3 or later to apply the default anonymous authentication change.
  • If an upgrade is not immediately possible, configure malcontent to perform anonymous pulls or disable the use of the Docker credential keychain for OCI image requests.
  • Enable logging and monitor for outbound authentication requests to external URLs, and block any unexpected token endpoints.

Generated by OpenCVE AI on April 18, 2026 at 01:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9m43-p3cx-w8j5 malcontent OCI image pull credential exfiltration via malicious registry token realm
History

Fri, 20 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Chainguard
Chainguard malcontent
CPEs cpe:2.3:a:chainguard:malcontent:*:*:*:*:*:*:*:*
Vendors & Products Chainguard
Chainguard malcontent

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Chainguard-dev
Chainguard-dev malcontent
Vendors & Products Chainguard-dev
Chainguard-dev malcontent

Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
Description malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference. malcontent uses google/go-containerregistry for OCI image pulls, which by default uses the Docker credential keychain. A malicious registry could return a `WWW-Authenticate` header redirecting token authentication to an attacker-controlled endpoint, causing credentials to be sent to that endpoint. Version 1.20.3 fixes the issue by defaulting to anonymous auth for OCI pulls.
Title malcontent's OCI image scanning could expose registry credentials
Weaknesses CWE-522
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

Chainguard Malcontent
Chainguard-dev Malcontent
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-29T21:40:17.926Z

Reserved: 2026-01-27T14:51:03.059Z

Link: CVE-2026-24845

cve-icon Vulnrichment

Updated: 2026-01-29T21:39:51.850Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T22:15:54.583

Modified: 2026-02-20T20:24:15.000

Link: CVE-2026-24845

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:30:16Z

Weaknesses