CVE-2026-32591

A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:mirror_registry_for_red_hat_openshift:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:mirror_registry_for_red_hat_openshift:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*

History

21 Apr 2026, 23:20

Type Values Removed Values Added
First Time Redhat
Redhat mirror Registry For Red Hat Openshift
Redhat quay
CPE cpe:2.3:a:redhat:mirror_registry_for_red_hat_openshift:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:mirror_registry_for_red_hat_openshift:2.0:*:*:*:*:*:*:*
References () https://access.redhat.com/security/cve/CVE-2026-32591 - () https://access.redhat.com/security/cve/CVE-2026-32591 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2446965 - () https://bugzilla.redhat.com/show_bug.cgi?id=2446965 - Issue Tracking, Vendor Advisory

08 Apr 2026, 18:26

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 18:26

Updated : 2026-04-21 23:20


NVD link : CVE-2026-32591

Mitre link : CVE-2026-32591

CVE.ORG link : CVE-2026-32591


JSON object : View

Products Affected

redhat

  • mirror_registry_for_red_hat_openshift
  • quay
CWE
CWE-918

Server-Side Request Forgery (SSRF)