Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-24jj-m523-3bdr
Summary
PowerShell Command Injection in Podman HyperV Machine
## Summary

A command injection vulnerability exists in Podman's HyperV machine backend. The VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing `$()` subexpression injection.

## Affected Code

**File**: `pkg/machine/hyperv/stubber.go:647`

```go
resize := exec.Command("powershell", []string{
    "-command",
    fmt.Sprintf("Resize-VHD \"%s\" %d", imagePath.GetPath(), newSize.ToBytes()),
}...)
```



## Root Cause

PowerShell evaluates `$()` subexpressions inside double-quoted strings before executing the outer command. The `fmt.Sprintf` call places the user-controlled image path directly into double quotes without escaping or sanitization.

## Impact

An attacker who can control the VM image path (through a crafted machine name or image directory) can execute arbitrary PowerShell commands with the privileges of the Podman process on the Windows host. On typical Windows installations, this means SYSTEM-level code execution.


## Patch

https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc654ed

The affected code is only used on Windows, all other operating systems are not affected by this and can thus ignore the CVE patch.

## Credit

We like to thank Sang-Hoon Choi (@KoreaSecurity) for reporting this issue to us.
Aliases
0
alias CVE-2026-33414
1
alias GHSA-hc8w-h2mf-hp59
Fixed_packages
0
url pkg:apk/alpine/podman@0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=aarch64&distroversion=edge&reponame=community
1
url pkg:apk/alpine/podman@0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=armhf&distroversion=edge&reponame=community
2
url pkg:apk/alpine/podman@0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=armv7&distroversion=edge&reponame=community
3
url pkg:apk/alpine/podman@0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=loongarch64&distroversion=edge&reponame=community
4
url pkg:apk/alpine/podman@0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=ppc64le&distroversion=edge&reponame=community
5
url pkg:apk/alpine/podman@0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=riscv64&distroversion=edge&reponame=community
6
url pkg:apk/alpine/podman@0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=s390x&distroversion=edge&reponame=community
7
url pkg:apk/alpine/podman@0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=x86&distroversion=edge&reponame=community
8
url pkg:apk/alpine/podman@0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/podman@0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/podman@0%3Farch=x86_64&distroversion=edge&reponame=community
9
url pkg:deb/debian/podman@5.8.2%2Bds1-1
purl pkg:deb/debian/podman@5.8.2%2Bds1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.8.2%252Bds1-1
10
url pkg:deb/debian/podman@5.8.2%2Bds1-1?distro=trixie
purl pkg:deb/debian/podman@5.8.2%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.8.2%252Bds1-1%3Fdistro=trixie
11
url pkg:golang/github.com/containers/podman/v5@5.8.2
purl pkg:golang/github.com/containers/podman/v5@5.8.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/containers/podman/v5@5.8.2
Affected_packages
0
url pkg:deb/debian/podman@5.4.2%2Bds1-2
purl pkg:deb/debian/podman@5.4.2%2Bds1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24jj-m523-3bdr
1
vulnerability VCID-6h1q-xus4-4qcs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.4.2%252Bds1-2
1
url pkg:deb/debian/podman@5.4.2%2Bds1-2?distro=trixie
purl pkg:deb/debian/podman@5.4.2%2Bds1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24jj-m523-3bdr
1
vulnerability VCID-6h1q-xus4-4qcs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/podman@5.4.2%252Bds1-2%3Fdistro=trixie
2
url pkg:rpm/redhat/podman-main@5.8.2-1?arch=hum1
purl pkg:rpm/redhat/podman-main@5.8.2-1?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24jj-m523-3bdr
1
vulnerability VCID-6h1q-xus4-4qcs
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman-main@5.8.2-1%3Farch=hum1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33414.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33414
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02219
published_at 2026-04-24T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07772
published_at 2026-04-18T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07789
published_at 2026-04-16T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11796
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33414
2
reference_url https://github.com/containers/podman
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman
3
reference_url https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc654ed
reference_id
reference_type
scores
0
value 4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
1
value 4.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T13:57:01Z/
url https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc654ed
4
reference_url https://github.com/containers/podman/security/advisories/GHSA-hc8w-h2mf-hp59
reference_id
reference_type
scores
0
value 4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
1
value 4.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T13:57:01Z/
url https://github.com/containers/podman/security/advisories/GHSA-hc8w-h2mf-hp59
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33414
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33414
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2458522
reference_id 2458522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2458522
7
reference_url https://access.redhat.com/errata/RHSA-2026:8211
reference_id RHSA-2026:8211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8211
Weaknesses
0
cwe_id 78
name Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
description The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
1
cwe_id 94
name Improper Control of Generation of Code ('Code Injection')
description The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Exploits
Severity_range_score4.0 - 8.8
Exploitability0.5
Weighted_severity7.9
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-24jj-m523-3bdr