{"id":"CVE-2026-33414","summary":"PowerShell Command Injection in Podman HyperV Machine","details":"Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2.","aliases":["GHSA-hc8w-h2mf-hp59"],"modified":"2026-04-17T04:04:12.716915Z","published":"2026-04-14T22:42:19.822Z","related":["CGA-cr9r-fxrc-9wmg"],"database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-78"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33414.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33414.json"},{"type":"FIX","url":"https://github.com/containers/podman/commit/571c842bd357ee626019ea97d030fb772fc654ed"},{"type":"ADVISORY","url":"https://github.com/containers/podman/security/advisories/GHSA-hc8w-h2mf-hp59"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33414"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/containers/podman","events":[{"introduced":"c4dfcf14874479e34b3f312f089fc5840e306258"},{"fixed":"5b263b5f5b48004a87caac44e67349a8266d9ef4"}],"database_specific":{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"4.8.0"},{"fixed":"5.8.2"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-33414.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"}]}