A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application. | |
| Title | Mirror-registry: quay: server-side request forgery in proxy cache upstream registry configuration | |
| First Time appeared |
Redhat
Redhat mirror Registry Redhat quay |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:/a:redhat:mirror_registry:1 cpe:/a:redhat:mirror_registry:2 cpe:/a:redhat:quay:3 |
|
| Vendors & Products |
Redhat
Redhat mirror Registry Redhat quay |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2026-04-08T17:06:58.222Z
Updated: 2026-04-08T17:06:58.222Z
Reserved: 2026-03-12T14:39:53.657Z
Link: CVE-2026-32591
No data.
Status : Awaiting Analysis
Published: 2026-04-08T18:26:00.107
Modified: 2026-04-08T21:26:13.410
Link: CVE-2026-32591