exploitdb
WORKING POC
by aprillefou · textlocalmultiple
https://www.exploit-db.com/exploits/52472
This PoC exploits an unauthenticated Docker Engine API exposure (TCP port 2375) to create a malicious container with bind mounts, enabling arbitrary host filesystem access and potential RCE. It leverages misconfigured Docker Desktop settings to execute commands without authentication.
Classification
Working Poc 90%
Target:
Docker Desktop < 4.44.3
No auth needed
Prerequisites:
Docker daemon exposed on TCP 2375 without TLS · Network access to the target port
nomisec
WORKING POC
46 stars
by BridgerAlderson · poc
https://github.com/BridgerAlderson/CVE-2025-9074-PoC
This repository contains a functional Bash script that exploits an unauthenticated Docker API (CVE-2025-9074) to achieve remote command execution on the host system. The script dynamically detects the target OS, enumerates available Docker images, and mounts the host filesystem to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Docker Engine API (port 2375)
No auth needed
Prerequisites:
Exposed Docker API on port 2375 · Network access to the target
nomisec
WORKING POC
11 stars
by Shaoshi17 · poc
https://github.com/Shaoshi17/CVE-2025-9074-Docker-Exploit
This repository contains a functional Python exploit for CVE-2025-9074, targeting Docker's API to execute commands and spawn interactive terminals in containers. The exploit interacts with the Docker daemon via HTTP requests and includes features for path normalization and dependency checks.
Classification
Working Poc 95%
Target:
Docker (unspecified version)
No auth needed
Prerequisites:
Access to Docker API endpoint (e.g., http://192.168.65.7:2375) · Running Docker containers
nomisec
WORKING POC
11 stars
by zenzue · poc
https://github.com/zenzue/CVE-2025-9074
This repository contains a functional Python-based PoC for CVE-2025-9074, which exploits a misconfiguration in Docker Desktop for Windows where the Docker Engine API is exposed to containers, allowing an attacker to create a bind mount to the host's C: drive and write arbitrary files.
Classification
Working Poc 100%
Target:
Docker Desktop for Windows (versions with exposed Engine API)
No auth needed
Prerequisites:
Access to a container running on the vulnerable host · Docker Engine API exposed at http://192.168.65.7:2375
nomisec
WORKING POC
8 stars
by j3r1ch0123 · poc
https://github.com/j3r1ch0123/CVE-2025-9074
This repository contains a functional Python PoC for CVE-2025-9074, a Docker Remote API misconfiguration vulnerability. The exploit demonstrates how an attacker can create and start containers on a Docker daemon exposed without authentication.
Classification
Working Poc 100%
Target:
Docker Daemon (exposed Remote API)
No auth needed
Prerequisites:
Docker daemon exposed on tcp://0.0.0.0:2375 without authentication
github
WORKING POC
4 stars
by ctkqiang · gopoc
https://github.com/ctkqiang/CVE-Exploits/tree/main/CVE-2025-9074
This is a functional exploit for Docker's unauthenticated API (port 2375) that allows container enumeration, file exfiltration, and interactive shell access. It uses the Docker API to list containers, extract files, and execute commands via `docker exec`.
Classification
Working Poc 95%
Target:
Docker (unauthenticated API on port 2375)
No auth needed
Prerequisites:
Docker API exposed on port 2375 without authentication · Network access to the target host
nomisec
WORKING POC
4 stars
by xwpdx0 · poc
https://github.com/xwpdx0/poc-2025-9074
This repository contains a functional exploit for CVE-2025-9074, targeting unauthenticated Docker API endpoints. The PoC includes an interactive shell for post-exploitation operations, demonstrating remote command execution capabilities.
Classification
Working Poc 95%
Target:
Docker API (unauthenticated endpoints)
No auth needed
Prerequisites:
Exposed Docker API endpoint without authentication · Network access to the target
github
SUSPICIOUS
3 stars
by fortihack · pythonpoc
https://github.com/fortihack/CVE-2025-9074
The repository claims to provide a PoC for CVE-2025-9074 (Docker Remote API misconfiguration) but only includes a README with generic details and a link to an external download for the exploit code. The exploit.py file is a bit.ly link, which is a red flag for potential malware or deception.
Classification
Suspicious 90%
Target:
Docker Remote API (unauthenticated)
No auth needed
Prerequisites:
Docker daemon exposed without authentication on TCP port 2375
github
SCANNER
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-9074
The repository contains a scanner for CVE-2024-21762, a Fortinet SSL VPN vulnerability, which checks for the presence of the vulnerability by sending crafted HTTP requests. It also includes writeups for other CVEs like CVE-2024-10654, detailing authentication bypass vulnerabilities in TOTOLINK devices.
Classification
Scanner 90%
Target:
Fortinet SSL VPN, TOTOLINK LR350, TOTOLINK T6
No auth needed
Prerequisites:
network access to the target device
nomisec
SUSPICIOUS
1 stars
by fsoc-ghost-0x · poc
https://github.com/fsoc-ghost-0x/CVE-2025-9074_DAEMON_KILLER
The repository contains a heavily stylized bash script with cinematic animations and verbose output but lacks actual exploit code for CVE-2025-9074. It appears to be a social engineering lure with no technical details about the vulnerability.
Classification
Suspicious 90%
Target:
unknown
No auth needed
nomisec
WORKING POC
1 stars
by pppxo · poc
https://github.com/pppxo/CVE-2025-9074-PoC-Bash
This repository contains a functional Bash script that exploits CVE-2025-9074 by leveraging an exposed Docker API to create a container with a mounted host directory, allowing arbitrary command execution on the host system. The PoC demonstrates the vulnerability by binding the host's Windows C drive to a container directory and executing commands within that context.
Classification
Working Poc 95%
Target:
Docker API (unspecified version)
No auth needed
Prerequisites:
Exposed Docker API on TCP port 2375 · Access to the Docker API endpoint
nomisec
WORKING POC
1 stars
by PtechAmanja · poc
https://github.com/PtechAmanja/CVE-2025-9074-Docker-Desktop-Container-Escape
This repository contains a functional exploit for CVE-2025-9074, a critical container escape vulnerability in Docker Desktop. The exploit leverages unauthenticated access to the Docker Engine API to create privileged containers and achieve host filesystem access.
Classification
Working Poc 95%
Target:
Docker Desktop < 4.44.3
No auth needed
Prerequisites:
Access to a container running on vulnerable Docker Desktop · Network access to the Docker Engine API at 192.168.65.7:2375
github
WORKING POC
1 stars
by OilSeller2001 · pythonpoc
https://github.com/OilSeller2001/PoC-for-CVE-2025-9074
This repository contains a functional Python-based PoC for CVE-2025-9074, which exploits unauthenticated Docker Engine API exposure on port 2375. The script automates the process of creating a malicious container with host filesystem bind mounts, leading to potential host compromise.
Classification
Working Poc 95%
Target:
Docker Engine API (TCP port 2375)
No auth needed
Prerequisites:
Docker Engine API exposed on TCP port 2375 without authentication · Network access to the target port
nomisec
WORKING POC
1 stars
by pucagit · poc
https://github.com/pucagit/CVE-2025-9074
This repository provides a functional proof-of-concept exploit for CVE-2025-9074, demonstrating a Docker Desktop vulnerability that allows container escape via unauthenticated access to the internal HTTP API. The PoC includes detailed steps to create and start a container with host volumes mounted, enabling read/write access to the host filesystem.
Classification
Working Poc 95%
Target:
Docker Desktop ≤ 4.44.3
No auth needed
Prerequisites:
Docker Desktop prior to 4.44.3 · Running under a user with privileges matching the targeted mounted folder
nomisec
WORKING POC
by chernandez321 · poc
https://github.com/chernandez321/CVE-2025-9074-docker-escape
This repository contains a functional exploit script for CVE-2025-9074, which leverages an unauthenticated Docker Remote API to escape a container and gain privileged access to the host system. The exploit creates a privileged container with host filesystem bind mounts, allowing arbitrary command execution on the host.
Classification
Working Poc 95%
Target:
Docker (Remote API exposed on tcp/2375 without authentication)
No auth needed
Prerequisites:
Docker Remote API exposed on tcp/2375 without authentication · Network access to the Docker API endpoint
nomisec
WORKING POC
by rocket-panda · poc
https://github.com/rocket-panda/CVE-2025-9074
This Bash script exploits CVE-2025-9074 by interacting with the Docker API to create a container, mount the host's C drive, and execute arbitrary commands. The output is streamed back to the attacker, demonstrating remote code execution (RCE).
Classification
Working Poc 95%
Target:
Docker (version not specified)
No auth needed
Prerequisites:
Docker API exposed on port 2375 · Access to the Docker API endpoint
nomisec
SUSPICIOUS
by KvzinNcpx7 · poc
https://github.com/KvzinNcpx7/CVE-2025-9074_DAEMON_KILLER
The repository contains a heavily stylized bash script with cinematic animations and verbose output but lacks actual exploit code for CVE-2025-9074. It appears to be a social engineering lure with no technical details about the vulnerability.
Classification
Suspicious 90%
Target:
unknown
No auth needed
nomisec
WORKING POC
by matesz44 · poc
https://github.com/matesz44/CVE-2025-9074
This script exploits CVE-2025-9074, a Docker Desktop LPE vulnerability via unauthenticated Docker Engine API access. It creates a malicious container with a reverse shell payload and binds host directories for privilege escalation.
Classification
Working Poc 95%
Target:
Docker Desktop (Docker Engine API)
No auth needed
Prerequisites:
Docker Engine API exposed without authentication · Network access to the Docker host
nomisec
SUSPICIOUS
by KvzinNcpx7 · poc
https://github.com/KvzinNcpx7/kvzinncpx7.github.io
The repository lacks actual exploit code and instead directs users to external downloads via GitHub releases. The README uses vague marketing language without technical details about CVE-2025-9074.
Classification
Suspicious 95%
Target:
Docker (unspecified version)
No auth needed
Prerequisites:
Docker installed
nomisec
WORKING POC
by x0da6h · poc
https://github.com/x0da6h/POC-for-CVE-2025-9074
This script exploits CVE-2025-9074 by leveraging Docker's HTTP API to perform arbitrary file read/write operations on the host system via container volume mounts. It demonstrates the vulnerability by creating a container with a bind mount to the target path and executing commands to read or write files.
Classification
Working Poc 95%
Target:
Docker Engine (version not specified, but likely affects versions with exposed HTTP API)
No auth needed
Prerequisites:
Docker HTTP API exposed on port 2375 (or custom port) · Access to the Docker API endpoint
nomisec
WORKING POC
by zaydbf · poc
https://github.com/zaydbf/CVE-2025-9074-Poc
This repository contains a functional Bash script that exploits an unauthenticated Docker API vulnerability (CVE-2025-9074) to achieve remote code execution by creating a privileged container with host filesystem mounting and reverse shell payload.
Classification
Working Poc 95%
Target:
Docker Engine API (port 2375)
No auth needed
Prerequisites:
Exposed Docker API on port 2375 · Presence of an Alpine or similar image on the target
nomisec
WORKING POC
by 3rendil · poc
https://github.com/3rendil/CVE-2025-9074-POC
This repository contains a functional exploit for CVE-2025-9074, targeting a Docker API vulnerability to achieve remote code execution via container creation with a reverse shell payload. The script automates the process of creating a privileged container with host filesystem access and network mode set to host.
Classification
Working Poc 95%
Target:
Docker API (version not specified)
No auth needed
Prerequisites:
Docker API exposed on port 2375 · Network access to the target · Attacker-controlled listener for reverse shell
nomisec
WORKING POC
by XRayZen · poc
https://github.com/XRayZen/cve-2025-9074-poc
This repository contains a functional Go-based PoC for CVE-2025-9074, demonstrating how an unauthenticated attacker can exploit Docker Engine's remote API to create a privileged container with host filesystem access. The PoC interacts with the Docker API to create a container, mount host directories, and write a file to the host system.
Classification
Working Poc 95%
Target:
Docker Engine (unauthenticated remote API on TCP/2375)
No auth needed
Prerequisites:
Docker Engine with unauthenticated remote API exposed on TCP/2375 · Network access to the Docker API endpoint