Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-32590— Mirror-registry: remote code execution using pickle deserialization

CVSS 7.1 · High EPSS 0.13% · P31
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-32590

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Mirror-registry: remote code execution using pickle deserialization
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat Quay 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Quay是美国红帽(Red Hat)公司的一款分布式容器镜像仓库,它主要用于构建、分布和部署容器。 Red Hat Quay存在代码问题漏洞,该漏洞源于处理可恢复容器镜像层上传时,中间数据存储格式可能被篡改,导致在服务器上执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red Hatmirror registry for Red Hat OpenShift-cpe:/a:redhat:mirror_registry:1
Red Hatmirror registry for Red Hat OpenShift 2-cpe:/a:redhat:mirror_registry:2
Red HatRed Hat Quay 3-cpe:/a:redhat:quay:3
Red HatRed Hat Quay 3-cpe:/a:redhat:quay:3

II. Public POCs for CVE-2026-32590

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-32590

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2026-04-08 · 10 CVEs total

CVE-2026-325897.4 HIGHMirror-registry: quay: insecure direct object reference in blobupload
CVE-2026-23776.5 MEDIUMMirror-registry: quay: quay: server-side request forgery via log export functionality
CVE-2025-578516.4 MEDIUMMce: privilege escalation via excessive /etc/passwd permissions
CVE-2025-578476.4 MEDIUMAnsible-automation-platform: privilege escalation via excessive group writable /etc/passwd
CVE-2025-578546.4 MEDIUMOsus-operator: privilege escalation via excessive /etc/passwd permissions
CVE-2025-578536.4 MEDIUMWeb-terminal: privilege escalation via excessive /etc/passwd permissions
CVE-2025-587136.4 MEDIUMRhpam: privilege escalation via excessive /etc/passwd permissions
CVE-2025-142435.3 MEDIUMMirror-registry: openshift mirror registry: user enumeration via authentication error mess
CVE-2026-325915.2 MEDIUMMirror-registry: quay: server-side request forgery in proxy cache upstream registry config

IV. Related Vulnerabilities

V. Comments for CVE-2026-32590

No comments yet


Leave a comment