A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-32591 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2446965 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Apr 2026, 23:20
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Redhat
Redhat mirror Registry For Red Hat Openshift Redhat quay |
|
| CPE | cpe:2.3:a:redhat:mirror_registry_for_red_hat_openshift:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:mirror_registry_for_red_hat_openshift:2.0:*:*:*:*:*:*:* |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-32591 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2446965 - Issue Tracking, Vendor Advisory |
08 Apr 2026, 18:26
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 18:26
Updated : 2026-04-21 23:20
NVD link : CVE-2026-32591
Mitre link : CVE-2026-32591
CVE.ORG link : CVE-2026-32591
JSON object : View
Products Affected
redhat
- mirror_registry_for_red_hat_openshift
- quay
CWE
CWE-918
Server-Side Request Forgery (SSRF)
