Description
A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems.
Published: 2026-04-08
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: Server‑Side Request Forgery enabling internal network access
Action: Immediate Patch
AI Analysis

Impact

A flaw in Red Hat mirror‑registry allows authenticated users to supply an arbitrary web address when exporting logs, causing the backend to perform server‑side requests. This Server‑Side Request Forgery can reach internal network resources, exposing sensitive data or permitting further attacks. The weakness is categorized as CWE‑918.

Affected Systems

The vulnerability affects Red Hat OpenShift mirror‑registry components and Quay 3. The specific affected packages include mirror‑registry version 1, mirror‑registry version 2, and Quay 3, as indicated by their Common Platform Enumeration strings.

Risk and Exploitability

The nominal CVSS score of 6.5 reflects a moderate severity, and the absence of an EPSS score makes the precise exploitation likelihood uncertain. The vulnerability is not listed in CISA’s KEV catalog, indicating no confirmed public exploits yet. Because the exploit requires an authenticated user with permission to export logs, an attacker must first gain legitimate access; from there they can trick the system into accessing internal resources. The risk is significant for environments where internal services are not properly segmented or monitored.

Generated by OpenCVE AI on April 8, 2026 at 18:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply Red Hat patch for mirror‑registry and Quay 3 updates as distributed by the vendor
  • Restrict log export functionality to the minimum set of privileged users
  • Use network segmentation and firewall rules to block unauthorized internal requests from the mirror‑registry service

Generated by OpenCVE AI on April 8, 2026 at 18:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems.
Title Mirror-registry: quay: quay: server-side request forgery via log export functionality
First Time appeared Redhat
Redhat mirror Registry
Redhat quay
Weaknesses CWE-918
CPEs cpe:/a:redhat:mirror_registry:1
cpe:/a:redhat:mirror_registry:2
cpe:/a:redhat:quay:3
Vendors & Products Redhat
Redhat mirror Registry
Redhat quay
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Redhat Mirror Registry Quay
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-08T18:43:00.505Z

Reserved: 2026-02-11T20:57:59.704Z

Link: CVE-2026-2377

cve-icon Vulnrichment

Updated: 2026-04-08T18:42:56.263Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T17:21:16.237

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-2377

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:39:06Z

Weaknesses