Impact
The MLX inference backend in Docker Model Runner on macOS imports and executes arbitrary Python files listed in a model’s configuration, without any sandboxing or trust guard. Because the loader uses importlib unconditionally, a malicious model can contain code that runs as the Docker Desktop user, giving an attacker full control of the host machine's file system and resources.
Affected Systems
Docker Desktop on macOS with the Model Runner feature enabled is affected. Any container that accesses the Model Runner API can trigger the vulnerability by loading a model that points to a malicious Python file.
Risk and Exploitability
The vulnerability has a CVSS score of 8.8 and is not currently listed in the CISA KEV catalog. Its exploitability relies on an attacker-controlled OCI registry from which a container can pull a malicious model and then activate inference via the model‑runner.docker.internal API. Any container on the Docker network can initiate this, so the risk is significant for environments that run untrusted containers with Model Runner enabled.
OpenCVE Enrichment