CVE-2026-24845: CWE-522: Insufficiently Protected Credentials in chainguard-dev malcontent
malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference. malcontent uses google/go-containerregistry for OCI image pulls, which by default uses the Docker credential keychain. A malicious registry could return a `WWW-Authenticate` header redirecting token authentication to an attacker-controlled endpoint, causing credentials to be sent to that endpoint. Version 1.20.3 fixes the issue by defaulting to anonymous auth for OCI pulls.
AI Analysis
Technical Summary
CVE-2026-24845 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting the malcontent tool developed by chainguard-dev. Malcontent is designed to detect supply-chain compromises by analyzing OCI container images. Versions from 0.10.0 up to but not including 1.20.3 use the google/go-containerregistry library to pull OCI images, which by default utilizes the Docker credential keychain to authenticate with registries. The vulnerability occurs when a malicious Docker registry responds with a crafted WWW-Authenticate HTTP header that redirects token authentication requests to an attacker-controlled endpoint. This causes malcontent to send its stored Docker registry credentials to the attacker’s server, exposing sensitive authentication tokens. The attack vector requires the user to scan a specially crafted OCI image reference, thus involving user interaction, but does not require prior authentication or elevated privileges. The impact is a high confidentiality breach as credentials can be stolen, potentially allowing attackers to access private container registries or perform further supply chain attacks. The issue is mitigated in malcontent version 1.20.3 by switching the default OCI pull authentication mode to anonymous, preventing credential leakage during image pulls from untrusted registries. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of Docker registry credentials used by malcontent during supply chain security scans. Exposure of these credentials could allow attackers to access private container images, modify or replace images, and potentially introduce malicious code into the software supply chain. This risk is particularly critical for organizations relying on containerized deployments and DevSecOps pipelines that integrate malcontent for image scanning. Compromise of registry credentials can lead to broader supply chain attacks, undermining trust in software integrity and causing operational disruptions. Additionally, leaked credentials could be used for lateral movement within cloud or on-premises environments. The vulnerability's exploitation requires scanning a malicious image, which could occur if an attacker convinces an analyst or automated system to scan a crafted image from an attacker-controlled registry. European entities with stringent data protection regulations (e.g., GDPR) may also face compliance risks if credential leakage leads to unauthorized access or data breaches.
Mitigation Recommendations
European organizations should immediately upgrade malcontent to version 1.20.3 or later, which defaults to anonymous authentication for OCI image pulls, eliminating the credential leakage vector. Until upgrade, organizations should restrict malcontent scans to trusted registries only and avoid scanning images from unverified or external sources. Network-level controls can be implemented to block outbound requests to unknown or suspicious registry endpoints. Additionally, auditing and rotating Docker registry credentials regularly can limit the impact of any potential credential exposure. Integrating strict validation and whitelisting of OCI image sources in CI/CD pipelines will reduce the risk of scanning malicious images. Monitoring network traffic for unusual authentication redirects or unexpected outbound connections from scanning hosts can help detect exploitation attempts. Finally, educating security and DevOps teams about this vulnerability and safe scanning practices is essential to prevent inadvertent exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2026-24845: CWE-522: Insufficiently Protected Credentials in chainguard-dev malcontent
Description
malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference. malcontent uses google/go-containerregistry for OCI image pulls, which by default uses the Docker credential keychain. A malicious registry could return a `WWW-Authenticate` header redirecting token authentication to an attacker-controlled endpoint, causing credentials to be sent to that endpoint. Version 1.20.3 fixes the issue by defaulting to anonymous auth for OCI pulls.
AI-Powered Analysis
Technical Analysis
CVE-2026-24845 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting the malcontent tool developed by chainguard-dev. Malcontent is designed to detect supply-chain compromises by analyzing OCI container images. Versions from 0.10.0 up to but not including 1.20.3 use the google/go-containerregistry library to pull OCI images, which by default utilizes the Docker credential keychain to authenticate with registries. The vulnerability occurs when a malicious Docker registry responds with a crafted WWW-Authenticate HTTP header that redirects token authentication requests to an attacker-controlled endpoint. This causes malcontent to send its stored Docker registry credentials to the attacker’s server, exposing sensitive authentication tokens. The attack vector requires the user to scan a specially crafted OCI image reference, thus involving user interaction, but does not require prior authentication or elevated privileges. The impact is a high confidentiality breach as credentials can be stolen, potentially allowing attackers to access private container registries or perform further supply chain attacks. The issue is mitigated in malcontent version 1.20.3 by switching the default OCI pull authentication mode to anonymous, preventing credential leakage during image pulls from untrusted registries. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of Docker registry credentials used by malcontent during supply chain security scans. Exposure of these credentials could allow attackers to access private container images, modify or replace images, and potentially introduce malicious code into the software supply chain. This risk is particularly critical for organizations relying on containerized deployments and DevSecOps pipelines that integrate malcontent for image scanning. Compromise of registry credentials can lead to broader supply chain attacks, undermining trust in software integrity and causing operational disruptions. Additionally, leaked credentials could be used for lateral movement within cloud or on-premises environments. The vulnerability's exploitation requires scanning a malicious image, which could occur if an attacker convinces an analyst or automated system to scan a crafted image from an attacker-controlled registry. European entities with stringent data protection regulations (e.g., GDPR) may also face compliance risks if credential leakage leads to unauthorized access or data breaches.
Mitigation Recommendations
European organizations should immediately upgrade malcontent to version 1.20.3 or later, which defaults to anonymous authentication for OCI image pulls, eliminating the credential leakage vector. Until upgrade, organizations should restrict malcontent scans to trusted registries only and avoid scanning images from unverified or external sources. Network-level controls can be implemented to block outbound requests to unknown or suspicious registry endpoints. Additionally, auditing and rotating Docker registry credentials regularly can limit the impact of any potential credential exposure. Integrating strict validation and whitelisting of OCI image sources in CI/CD pipelines will reduce the risk of scanning malicious images. Monitoring network traffic for unusual authentication redirects or unexpected outbound connections from scanning hosts can help detect exploitation attempts. Finally, educating security and DevOps teams about this vulnerability and safe scanning practices is essential to prevent inadvertent exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-27T14:51:03.059Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697bd0d5ac06320222ba1d5e
Added to database: 1/29/2026, 9:27:49 PM
Last enriched: 1/29/2026, 9:42:20 PM
Last updated: 2/7/2026, 8:07:30 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.