CVE-2026-32591

high Red Hat
CVSS v3 Base Score
5.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Confidentiality
High
Integrity
Low
Availability
None
Published: April 8, 2026 (36 days ago)
Last Modified: April 8, 2026
Vendor: Red Hat
Source: REDHAT

Description

A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.

CWE

CWE-918

Affected Products

mirror registry for Red Hat OpenShiftmirror registry for Red Hat OpenShift 2Red Hat Quay 3

References