No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Wed, 22 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat quay 3
|
|
| Vendors & Products |
Redhat quay 3
|
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot account creation, the re-authentication prompt can be bypassed. This allows a user with a timed-out session, or an attacker with access to an idle authenticated browser session, to perform privileged actions without providing valid credentials. The vulnerability enables unauthorized execution of sensitive operations despite the user interface displaying an error for invalid credentials. | |
| Title | Quay: red hat quay: authentication bypass allows privileged actions without valid credentials | |
| First Time appeared |
Redhat
Redhat quay |
|
| Weaknesses | CWE-613 | |
| CPEs | cpe:/a:redhat:quay:3 | |
| Vendors & Products |
Redhat
Redhat quay |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-22T12:55:24.902Z
Reserved: 2026-04-22T08:54:17.842Z
Link: CVE-2026-6848
Updated: 2026-04-22T12:55:21.648Z
Status : Received
Published: 2026-04-22T10:16:52.347
Modified: 2026-04-22T10:16:52.347
Link: CVE-2026-6848
OpenCVE Enrichment
Updated: 2026-04-22T11:43:43Z