Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.
References
| Link | Resource |
|---|---|
| https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc654ed | Patch |
| https://github.com/containers/podman/security/advisories/GHSA-hc8w-h2mf-hp59 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
23 Apr 2026, 17:49
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc654ed - Patch | |
| References | () https://github.com/containers/podman/security/advisories/GHSA-hc8w-h2mf-hp59 - Patch, Vendor Advisory | |
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:podman_project:podman:*:*:*:*:*:*:*:* |
|
| First Time |
Podman Project
Podman Project podman Microsoft Microsoft windows |
14 Apr 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-14 23:16
Updated : 2026-04-23 17:49
NVD link : CVE-2026-33414
Mitre link : CVE-2026-33414
CVE.ORG link : CVE-2026-33414
JSON object : View
Products Affected
microsoft
- windows
podman_project
- podman
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
