CVE-2026-6848Insufficient Session Expiration in Quay-rhel8

Severity
5.4MEDIUMNVD
EPSS
0.1%
top 84.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22

Description

A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot account creation, the re-authentication prompt can be bypassed. This allows a user with a timed-out session, or an attacker with access to an idle authenticated browser session, to perform privileged actions without providing valid credentials. The vulnerability enables unauthorized execution of sensitive operations despite the user interface displayin

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5

Affected Packages2 packages

Red Hatquay/quay-rhel8
Red Hatquay/quay-rhel9

🔴Vulnerability Details

1
GHSA
GHSA-fwq2-5p9g-fm29: A flaw was found in Red Hat Quay2026-04-22

📋Vendor Advisories

1
Red Hat
quay: Red Hat Quay: Authentication bypass allows privileged actions without valid credentials2026-04-10

💬Community

1
Bugzilla
CVE-2026-6848 quay: Red Hat Quay: Authentication bypass allows privileged actions without valid credentials2026-04-21
CVE-2026-6848 — Insufficient Session Expiration | cvebase