Description
Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.1, tag deletion via the DELETE /v2/<name>/manifests/<tag> endpoint bypasses the storage.delete.enabled: false configuration, allowing any API client to remove tags from repositories even when the operator has explicitly disabled deletion. This vulnerability is fixed in 3.1.1.
Published: 2026-05-14
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows a client that can reach the Docker Distribution API to delete any tag from any repository by invoking DELETE /v2/<name>/manifests/<tag>. The bug bypasses the storage.delete.enabled configuration flag, so even when this setting is set to false the API will remove tags. The flaw is a classic missing authorization error (CWE-863) that provides an attacker the ability to modify the contents of a registry without proper permission checks.

Affected Systems

This issue affects the distribution:distribution repository, specifically all releases older than version 3.1.1. The fix was introduced in 3.1.1, restoring the proper enforcement of the storage.delete.enabled setting. No specific version ranges are provided beyond the statement that releases prior to 3.1.1 are vulnerable.

Risk and Exploitability

With a CVSS score of 6.3 the vulnerability is assessed at medium severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a direct API call to the DELETE endpoint; authentication requirements are not explicitly described but the description indicates any API client can perform the operation, suggesting the flaw may be exploitable without special credentials. Because of the lack of an exploitation probability score, an effective mitigation strategy is to update quickly.

Generated by OpenCVE AI on May 14, 2026 at 18:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade distribution to version 3.1.1 or later to restore correct enforcement of storage.delete.enabled
  • Verify that the storage.delete.enabled flag is set to false in the registry configuration and test that tag deletion fails for unauthorized accounts
  • Implement monitoring on the registry API to log any tag deletion requests and alert on unauthorized or unexpected deletions

Generated by OpenCVE AI on May 14, 2026 at 18:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6pjf-3r9x-m592 Distribution's tag deletion bypasses `storage.delete.enabled` configuration
History

Fri, 15 May 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:distribution:distribution:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Thu, 14 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Distribution
Distribution distribution
Vendors & Products Distribution
Distribution distribution

Thu, 14 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.1, tag deletion via the DELETE /v2/<name>/manifests/<tag> endpoint bypasses the storage.delete.enabled: false configuration, allowing any API client to remove tags from repositories even when the operator has explicitly disabled deletion. This vulnerability is fixed in 3.1.1.
Title Distribution: Tag deletion bypasses `storage.delete.enabled` configuration
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Distribution Distribution
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T18:38:43.215Z

Reserved: 2026-04-22T15:11:54.671Z

Link: CVE-2026-41888

cve-icon Vulnrichment

Updated: 2026-05-14T18:38:37.491Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-14T18:16:47.380

Modified: 2026-05-15T18:25:48.043

Link: CVE-2026-41888

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T18:45:26Z

Weaknesses