Description
Docker Model Runner (DMR) is software used to manage, run, and deploy AI models using Docker. Prior to version 1.1.25, Docker Model Runner contains an SSRF vulnerability in its OCI registry token exchange flow. When pulling a model, Model Runner follows the realm URL from the registry's WWW-Authenticate header without validating the scheme, hostname, or IP range. A malicious OCI registry can set the realm to an internal URL (e.g., http://127.0.0.1:3000/), causing Model Runner running on the host to make arbitrary GET requests to internal services and reflect the full response body back to the caller. Additionally, the token exchange mechanism can relay data from internal services back to the attacker-controlled registry via the Authorization: Bearer header. This issue has been patched in version 1.1.25. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) blocks container access to Model Runner, preventing exploitation. However, if the Docker Model Runner is exposed to localhost over TCP in specific configurations, the vulnerability is still exploitable.
Published: 2026-04-01
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Internal Network Access and Data Exfiltration
Action: Patch Immediately
AI Analysis

Impact

Docker Model Runner (DMR) stores an SSRF weakness in its OCI registry token exchange flow. The client blindly follows the realm URL provided in the WWW-Authenticate header of the registry response, ignoring scheme, hostname, or IP range checks. A malicious OCI registry can set the realm to an internal address such as http://127.0.0.1:3000/, causing the DMR running on the host to issue arbitrary HTTP GET requests to internal services. The full response body is returned to the caller, and the token exchange mechanism can also forward data from internal services back to the attacker through the Authorization: Bearer header. This allows an attacker to read internal resources and potentially exfiltrate sensitive data. The weakness is classified as CWE‑918 (Server‑Side Request Forgery).

Affected Systems

The vulnerability affects Docker Model Runner versions prior to 1.1.25. Docker Desktop users are protected when Enhanced Container Isolation (ECI) is enabled, because it blocks container access to the DMR service. However, if DMR is exposed to localhost over TCP in certain configurations, the SSRF flaw remains exploitable. Any deployment of DMR that does not run the patched version could be impacted.

Risk and Exploitability

The CVSS base score is 6.8, indicating a medium severity vulnerability. EPSS is reported as less than 1%, suggesting a low probability of widespread exploitation, and it is not listed in the CISA KEV catalog. The attack requires the attacker to control or influence an OCI registry that the DMR will pull a model from. Once the manipulative registry is accessed, the client’s unvalidated request gives the attacker access to internal network services and the ability to leak internal data. Deployments with local TCP exposure are at the highest risk, while configurations protected by ECI or upgraded to 1.1.25 are safe.

Generated by OpenCVE AI on April 14, 2026 at 21:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Docker Model Runner to version 1.1.25 or newer
  • Enable Enhanced Container Isolation (ECI) in Docker Desktop if possible
  • Restrict the Model Runner service so it is not exposed to localhost over TCP
  • Monitor registry logs for suspicious WWW-Authenticate realm values or Authorization headers
  • Contact Docker support if legacy versions must remain in use

Generated by OpenCVE AI on April 14, 2026 at 21:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x2f5-332j-9xwq Docker Model Runner OCI Registry Client Vulnerable to Server-Side Request Forgery (SSRF)
History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Docker model Runner
CPEs cpe:2.3:a:docker:model_runner:*:*:*:*:*:docker:*:*
Vendors & Products Docker model Runner

Sat, 04 Apr 2026 03:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Docker
Docker model-runner
Vendors & Products Docker
Docker model-runner

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Docker Model Runner (DMR) is software used to manage, run, and deploy AI models using Docker. Prior to version 1.1.25, Docker Model Runner contains an SSRF vulnerability in its OCI registry token exchange flow. When pulling a model, Model Runner follows the realm URL from the registry's WWW-Authenticate header without validating the scheme, hostname, or IP range. A malicious OCI registry can set the realm to an internal URL (e.g., http://127.0.0.1:3000/), causing Model Runner running on the host to make arbitrary GET requests to internal services and reflect the full response body back to the caller. Additionally, the token exchange mechanism can relay data from internal services back to the attacker-controlled registry via the Authorization: Bearer header. This issue has been patched in version 1.1.25. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) blocks container access to Model Runner, preventing exploitation. However, if the Docker Model Runner is exposed to localhost over TCP in specific configurations, the vulnerability is still exploitable.
Title Docker Model Runner OCI Registry Client Vulnerable to Server-Side Request Forgery (SSRF)
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


Subscriptions

Docker Model-runner Model Runner
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-04T03:02:31.956Z

Reserved: 2026-03-24T22:20:06.211Z

Link: CVE-2026-33990

cve-icon Vulnrichment

Updated: 2026-04-04T03:02:04.767Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T17:28:39.823

Modified: 2026-04-14T20:08:23.340

Link: CVE-2026-33990

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses