A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems.

Project Subscriptions

Vendors Products
Mirror Registry Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems.
Title Mirror-registry: quay: quay: server-side request forgery via log export functionality
First Time appeared Redhat
Redhat mirror Registry
Redhat quay
Weaknesses CWE-918
CPEs cpe:/a:redhat:mirror_registry:1
cpe:/a:redhat:mirror_registry:2
cpe:/a:redhat:quay:3
Vendors & Products Redhat
Redhat mirror Registry
Redhat quay
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-08T16:26:07.649Z

Reserved: 2026-02-11T20:57:59.704Z

Link: CVE-2026-2377

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-08T17:21:16.237

Modified: 2026-04-08T17:21:16.237

Link: CVE-2026-2377

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses