The bug, tracked as CVE-2025-9074 and scoring 9.3 on the CVSS scale, left Docker's internal Engine API wide open on "192.168.65.7:2375." Any container could talk to it without authentication, which meant mounting drives and messing with system files was only a couple of HTTP requests away. On Windows, where Docker Desktop leans on WSL2, that translates into full read-write access to the C: drive and a clear path to administrator rights.