Programmer’s Digest #170
01/28/2026-02/04/2026 Docker Fixes Critical Ask Gordon AI Flaw, Critical React Native Metro Bug, Two High-Severity n8n Flaws And More
1. Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
Cybersecurity researchers have revealed details of a now-patched critical flaw in Ask Gordon, Docker’s AI assistant built into Docker Desktop and the Docker CLI, that could enable code execution and data exfiltration. The vulnerability was fixed in Docker version 4.50.0 released in November 2025. The issue arises because Ask Gordon treats unverified Docker image metadata as executable instructions. A single malicious LABEL field embedded in a Docker image can trigger a three-stage attack: Ask Gordon reads the instruction, forwards it to the Model Context Protocol (MCP) Gateway, and the gateway executes it using MCP tools—without validation. This could result in remote code execution on cloud and CLI systems or sensitive data exposure on desktop environments. The flaw represents a failure of contextual trust, described as Meta-Context Injection, where MCP cannot distinguish harmless metadata from pre-authorized commands. By weaponizing Docker image labels, attackers can hijack the AI’s reasoning process and bypass security boundaries.
2. Hackers Exploit Critical React Native Metro Bug to Breach Dev Systems
Hackers are actively exploiting a critical vulnerability, CVE-2025-11953, in the React Native Metro development server to target developers with malicious payloads for Windows and Linux. The flaw allows unauthenticated attackers to execute arbitrary OS commands on Windows via crafted POST requests, while on Linux and macOS it enables execution of arbitrary binaries with limited control. Metro, the default JavaScript bundler for React Native, exposes development-only HTTP endpoints by default and can bind to external network interfaces, increasing attack surface.
Researchers at JFrog disclosed the issue in November, identifying the vulnerable /open-url endpoint, which passes user-supplied input to the open() function without sanitization. The flaw affects @react-native-community/cli-server-api versions 4.8.0 through 20.0.0-alpha.2 and was fixed in version 20.0.0. VulnCheck observed in-the-wild exploitation starting December 21, 2025, with repeated attacks delivering base64-encoded PowerShell payloads that disable defenses, fetch second-stage binaries, and execute them. Despite active abuse, about 3,500 Metro servers remain exposed online.
3. Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Cybersecurity researchers have uncovered a supply chain attack targeting the Open VSX Registry, in which threat actors compromised a legitimate developer account to distribute malicious updates. On January 30, 2026, four popular extensions published by the developer oorzc were updated with malicious code embedding the GlassWorm malware loader, according to Socket researcher Kirill Boychenko. The extensions, some over two years old, had accumulated more than 22,000 downloads prior to the attack.
The incident is believed to stem from stolen publishing credentials, possibly via a leaked token. The malicious versions were later removed, but not before delivering a loader capable of decrypting and executing payloads at runtime. The malware targets macOS systems, harvesting browser data, cryptocurrency wallets, iCloud Keychain contents, developer credentials, and VPN configurations, posing serious risks to enterprise environments.
Unlike earlier GlassWorm campaigns that relied on typosquatting, this attack abused a trusted developer account, allowing the malware to blend into normal workflows. Researchers warn that removed extensions remain installed locally until developers release clean updates.
4. Ivanti Patches Exploited EPMM Zero-Days
Ivanti has released emergency patches for two critical zero-day vulnerabilities in Endpoint Manager Mobile (EPMM) that are being actively exploited in the wild. Tracked as CVE-2026-1281 and CVE-2026-1340 (CVSS 9.8), the flaws are unauthenticated code injection bugs that allow remote code execution. The issues affect EPMM’s in-house application distribution and Android file transfer configuration features. Successful exploitation could enable attackers to execute arbitrary code, move laterally, and access sensitive data, including administrator and user details as well as mobile device information. Ivanti says a limited number of customers were impacted at disclosure. All EPMM versions up to 12.7.0.0 and select 12.5.x and 12.6.x releases are affected. Ivanti has issued version-specific RPM patches and recommends upgrading to version 12.8.0.0 once available. CISA has added CVE-2026-1281 to its Known Exploited Vulnerabilities catalog, urging organizations to prioritize remediation due to the flaw’s severity.
5. SolarWinds Web Help Desk Vulnerability Actively Exploited
A US security agency has warned that a critical remote code execution (RCE) flaw in SolarWinds Web Help Desk is being actively exploited. CISA has added CVE-2025-40551 to its KEV Catalog, giving federal civilian agencies until Friday to apply patches released last week. Rated CVSS 9.8, the vulnerability is a deserialization of untrusted data issue that allows unauthenticated attackers to gain admin-level access and execute arbitrary commands on affected systems. While the KEV mandate applies only to federal agencies, CISA urges all organizations to patch promptly due to widespread use of the software in government, education, and healthcare.
CVE-2025-40551 is one of four critical flaws fixed in a January 28 update. The others include an additional RCE vulnerability and two authentication bypass bugs, all rated 9.8. Although only one flaw is currently exploited, attackers could chain them to fully compromise systems. SolarWinds advises upgrading to Web Help Desk 2026.1 immediately.
6. Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Cybersecurity researchers have disclosed two new vulnerabilities in the n8n workflow automation platform, including a critical flaw that could lead to full remote code execution. Identified by JFrog Security Research, CVE-2026-1470 (CVSS 9.9) allows any authenticated user to bypass n8n’s JavaScript Expression sandbox and execute arbitrary code on the main node. A second issue, CVE-2026-0863 (CVSS 8.5), enables authenticated users to escape the Python task sandbox and run arbitrary code on the host system.
Despite requiring authentication, CVE-2026-1470 is considered highly dangerous because any n8n user could completely take over an instance, including those running in “internal” execution mode. Given n8n’s access to sensitive enterprise workflows, credentials, and APIs, successful exploitation could provide attackers broad control across an organization.
Users are urged to upgrade to patched versions immediately. The disclosure follows recent reports of a separate unauthenticated n8n flaw, underscoring ongoing risks in sandboxing dynamic languages like JavaScript and Python.