Home

Description

A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.

PUBLISHED Reserved 2026-03-12 | Published 2026-04-08 | Updated 2026-05-20 | Assigner redhat




MEDIUM: 5.2CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N

Problem types

Server-Side Request Forgery (SSRF)

Product status

Default status
affected

1779204086 (rpm) before *
unaffected

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-03-12:Reported to Red Hat.
2026-04-08:Made public.

Credits

Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.

References

access.redhat.com/errata/RHSA-2026:19375 (RHSA-2026:19375) vendor-advisory

access.redhat.com/security/cve/CVE-2026-32591 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2446965 (RHBZ#2446965) issue-tracking

cve.org (CVE-2026-32591)

nvd.nist.gov (CVE-2026-32591)

Download JSON