CVE-2026-32591 PUBLISHED

Mirror-registry: quay: server-side request forgery in proxy cache upstream registry configuration

Assigner: redhat
Reserved: 12.03.2026 Published: 08.04.2026 Updated: 08.04.2026

A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
CVSS Score: 5.2

Product Status

Vendor Red Hat
Product mirror registry for Red Hat OpenShift
Versions Default: affected
Vendor Red Hat
Product mirror registry for Red Hat OpenShift 2
Versions Default: affected
Vendor Red Hat
Product Red Hat Quay 3
Versions Default: affected
Vendor Red Hat
Product Red Hat Quay 3
Versions Default: affected

Credits

  • Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.

References

Problem Types

  • Server-Side Request Forgery (SSRF) CWE