Description

A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.

INFO

Published Date :

2026-04-08T17:06:58.222Z

Last Modified :

2026-04-08T17:06:58.222Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2026-32591 vulnerability.

Vendors Products
Redhat
  • Mirror Registry
  • Quay
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32591.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact