A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot account creation, the re-authentication prompt can be bypassed. This allows a user with a timed-out session, or an attacker with access to an idle authenticated browser session, to perform privileged actions without providing valid credentials. The vulnerability enables unauthorized execution of sensitive operations despite the user interface displaying an error for invalid credentials.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat quay 3
|
|
| Vendors & Products |
Redhat quay 3
|
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot account creation, the re-authentication prompt can be bypassed. This allows a user with a timed-out session, or an attacker with access to an idle authenticated browser session, to perform privileged actions without providing valid credentials. The vulnerability enables unauthorized execution of sensitive operations despite the user interface displaying an error for invalid credentials. | |
| Title | Quay: red hat quay: authentication bypass allows privileged actions without valid credentials | |
| First Time appeared |
Redhat
Redhat quay |
|
| Weaknesses | CWE-613 | |
| CPEs | cpe:/a:redhat:quay:3 | |
| Vendors & Products |
Redhat
Redhat quay |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-22T12:55:24.902Z
Reserved: 2026-04-22T08:54:17.842Z
Link: CVE-2026-6848
Updated: 2026-04-22T12:55:21.648Z
Status : Received
Published: 2026-04-22T10:16:52.347
Modified: 2026-04-22T10:16:52.347
Link: CVE-2026-6848
OpenCVE Enrichment
Updated: 2026-04-22T11:43:43Z