A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server.
History

Thu, 09 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server.
Title Mirror-registry: remote code execution using pickle deserialization
First Time appeared Redhat
Redhat mirror Registry
Redhat quay
Weaknesses CWE-502
CPEs cpe:/a:redhat:mirror_registry:1
cpe:/a:redhat:mirror_registry:2
cpe:/a:redhat:quay:3
Vendors & Products Redhat
Redhat mirror Registry
Redhat quay
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-08T19:14:55.136Z

Reserved: 2026-03-12T14:39:53.657Z

Link: CVE-2026-32590

cve-icon Vulnrichment

Updated: 2026-04-08T19:14:52.191Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T18:25:59.947

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-32590

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-08T00:00:00Z

Links: CVE-2026-32590 - Bugzilla