Description
The vllm-metal inference backend in Docker Model Runner on macOS unconditionally sets trust_remote_code=True when loading model tokenizers, and runs without sandboxing. This causes transformers.AutoTokenizer.from_pretrained() to import and execute arbitrary Python files included in any model pulled from an OCI registry, resulting in arbitrary code execution on the Docker host as the Docker Desktop user when inference is triggered.

Any container on the Docker network can trigger this by calling the model-runner.docker.internal API to pull a malicious model and request inference.
Published: 2026-05-22
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vllm-metal inference backend in Docker Model Runner on macOS automatically sets trust_remote_code=True when loading model tokenizers and executes code without sandboxing. This flaw allows transformers.AutoTokenizer.from_pretrained() to import and run arbitrary Python files that are bundled with any model pulled from an OCI registry. When inference is triggered, those files run as the Docker Desktop user, giving an attacker the ability to execute code on the Docker host.

Affected Systems

Affected Systems The vulnerability affects Docker Desktop’s Docker Model Runner on macOS. Any Docker Desktop instance that has the Model Runner enabled and uses the vllm-metal inference backend is susceptible. No specific version range is listed, so all current and future releases that retain this behavior remain at risk.

Risk and Exploitability

With a CVSS score of 8.8 this issue is classified as high severity. The EPSS score is not available, and it is not currently listed in CISA’s KEV catalog. The attack vector is remote: an attacker can place a malicious model in a container on the Docker network, call the model-runner.docker.internal API to pull the model, and then trigger inference to cause arbitrary code execution on the host. No special privileges beyond the ability to run a container are required, making the exploitation path straightforward and likely given the widespread use of Docker.

Generated by OpenCVE AI on May 22, 2026 at 21:51 UTC.

Remediation

Vendor Workaround

Disable Docker Model Runner or only run trusted containers on Docker Desktop instances where Model Runner is enabled.


OpenCVE Recommended Actions

  • Disable Docker Model Runner or restrict its use to trusted containers (official workaround).
  • Upgrade Docker Desktop to the latest release that addresses this issue, if available.
  • Limit network access to the model-runner.docker.internal API, or isolate untrusted containers through segmentation or firewall rules.

Generated by OpenCVE AI on May 22, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Docker
Docker docker Desktop
Vendors & Products Docker
Docker docker Desktop

Fri, 22 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description The vllm-metal inference backend in Docker Model Runner on macOS unconditionally sets trust_remote_code=True when loading model tokenizers, and runs without sandboxing. This causes transformers.AutoTokenizer.from_pretrained() to import and execute arbitrary Python files included in any model pulled from an OCI registry, resulting in arbitrary code execution on the Docker host as the Docker Desktop user when inference is triggered. Any container on the Docker network can trigger this by calling the model-runner.docker.internal API to pull a malicious model and request inference.
Title Docker Model Runner container-to-host code execution via unsandboxed trust_remote_code in Python inference backends
Weaknesses CWE-829
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Docker Docker Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: Docker

Published:

Updated: 2026-05-22T19:24:15.662Z

Reserved: 2026-04-08T15:34:05.200Z

Link: CVE-2026-5817

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T22:00:12Z

Weaknesses