CVE-2026-32590 PUBLISHED

Mirror-registry: remote code execution using pickle deserialization

Assigner: redhat
Reserved: 12.03.2026 Published: 08.04.2026 Updated: 08.04.2026

A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 7.1

Product Status

Vendor Red Hat
Product mirror registry for Red Hat OpenShift
Versions Default: affected
Vendor Red Hat
Product mirror registry for Red Hat OpenShift 2
Versions Default: affected
Vendor Red Hat
Product Red Hat Quay 3
Versions Default: affected
Vendor Red Hat
Product Red Hat Quay 3
Versions Default: affected

Credits

  • Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.

References

Problem Types

  • Deserialization of Untrusted Data CWE