Description
A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.
Problem types
Server-Side Request Forgery (SSRF)
Product status
1779204086 (rpm) before *
Timeline
| 2026-03-12: | Reported to Red Hat. |
| 2026-04-08: | Made public. |
Credits
Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.
References
access.redhat.com/errata/RHSA-2026:19375 (RHSA-2026:19375)
access.redhat.com/security/cve/CVE-2026-32591
bugzilla.redhat.com/show_bug.cgi?id=2446965 (RHBZ#2446965)