Description
Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. From v3.4.0 to v3.28.0, an oversight in the CopyFile policy (and perhaps the CopyFile handler) allows untrusted hosts to write to arbitrary locations inside the guest workload image. This can be used to overwrite binaries inside the guest and exfiltrate data from containers; even those running inside CVMs. This vulnerability is fixed in v3.29.0.
Published: 2026-04-24
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in Kata Containers’ CopyFile policy implementation, which unintentionally allows a host to write to arbitrary paths within a guest workload image. By exploiting this oversight, an attacker can overwrite binaries inside the virtual machine and potentially exfiltrate data from containers. The exposed weakness is a classic path traversal flaw (CWE‑61) that compromises the integrity of guest file systems. Based on the description it is inferred that an attacker would need to gain or influence host access to perform the overwrite, and the impact could elevate privileges within the container ecosystem.

Affected Systems

Affected deployments are those running Kata Containers v3.4.0 through v3.28.0 on any host platform. The oversight exists in the CopyFile policy and handler used by these versions, and the issue is addressed in v3.29.0. Any environment that uses older versions of Kata Containers is therefore at risk.

Risk and Exploitability

The flaw carries a CVSS score of 8.2, indicating high severity. The EPSS score is below 1%, signifying a low but non‑zero likelihood of exploitation. It is not listed in CISA’s KEV catalog. Based on the description it is inferred that the exploit path requires an attacker to control or influence the Kata Containers host, which can then write arbitrary files into the guest. This makes the attack vector local to the host environment, but the impact is remote code execution inside the virtual machine.

Generated by OpenCVE AI on May 7, 2026 at 01:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kata Containers to version 3.29.0 or newer, which includes the policy fix.
  • Reconfigure the runtime to enforce strict CopyFile boundaries and validate paths before allowing any copy operations.
  • Audit guest VM images for unintended binary modifications and replace any corrupted or tampered binaries with known clean copies.

Generated by OpenCVE AI on May 7, 2026 at 01:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q49m-57vm-c8cc Kata Container has CopyFile Policy Subversion via Symlinks
History

Thu, 14 May 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Katacontainers confidential Containers
Katacontainers kata Containers
CPEs cpe:2.3:a:katacontainers:confidential_containers:*:*:*:*:*:*:*:*
cpe:2.3:a:katacontainers:kata_containers:*:*:*:*:*:*:*:*
Vendors & Products Katacontainers confidential Containers
Katacontainers kata Containers
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Wed, 13 May 2026 15:30:00 +0000

Type Values Removed Values Added
References

Thu, 07 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1220
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

threat_severity

Important


Mon, 04 May 2026 16:30:00 +0000


Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Katacontainers
Katacontainers kata-containers
Vendors & Products Katacontainers
Katacontainers kata-containers

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. From v3.4.0 to v3.28.0, an oversight in the CopyFile policy (and perhaps the CopyFile handler) allows untrusted hosts to write to arbitrary locations inside the guest workload image. This can be used to overwrite binaries inside the guest and exfiltrate data from containers; even those running inside CVMs. This vulnerability is fixed in v3.29.0.
Title Kata Containers: CopyFile Policy Subversion via Symlinks
Weaknesses CWE-61
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Katacontainers Confidential Containers Kata-containers Kata Containers
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-13T05:17:44.571Z

Reserved: 2026-04-20T14:01:46.672Z

Link: CVE-2026-41326

cve-icon Vulnrichment

Updated: 2026-05-13T05:17:44.571Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T19:17:12.253

Modified: 2026-05-14T16:33:30.310

Link: CVE-2026-41326

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-22T19:01:25Z

Links: CVE-2026-41326 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:30:17Z

Weaknesses