← Back to CVEs
CVE-2026-32591
MEDIUM5.2
Description
A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application.
CVE Details
CVSS v3.1 Score5.2
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionREQUIRED
Published4/8/2026
Last Modified4/8/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-918
References
https://access.redhat.com/security/cve/CVE-2026-32591(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2446965(secalert@redhat.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.