๐Ÿ” CVE Alert

CVE-2026-33414

UNKNOWN 0.0

PowerShell Command Injection in Podman HyperV Machine

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
8th

Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.

CWE CWE-78
Vendor containers
Product podman
Published Apr 14, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for containers podman

Be the first to know when new unknown vulnerabilities affecting containers podman are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

containers / podman
>= 4.8.0, < 5.8.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/containers/podman/security/advisories/GHSA-hc8w-h2mf-hp59 github.com: https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc654ed