A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems.
History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems.
Title Mirror-registry: quay: quay: server-side request forgery via log export functionality
First Time appeared Redhat
Redhat mirror Registry
Redhat quay
Weaknesses CWE-918
CPEs cpe:/a:redhat:mirror_registry:1
cpe:/a:redhat:mirror_registry:2
cpe:/a:redhat:quay:3
Vendors & Products Redhat
Redhat mirror Registry
Redhat quay
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-08T16:26:07.649Z

Reserved: 2026-02-11T20:57:59.704Z

Link: CVE-2026-2377

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-08T17:21:16.237

Modified: 2026-04-08T17:21:16.237

Link: CVE-2026-2377

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.