CVE-2026-32591

Published Apr 8, 2026

Last updated 11 days ago

Overview

Description
A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.
Source
secalert@redhat.com
NVD status
Analyzed
Products
mirror_registry_for_red_hat_openshift, quay

Risk scores

CVSS 3.1

Type
Primary
Base score
5.5
Impact score
4.2
Exploitability score
1.2
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N
Severity
MEDIUM

Weaknesses

secalert@redhat.com
CWE-918

Social media

Hype score
Not currently trending

Configurations