Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4374: Incorrect Privilege Assignment in Red Hat Red Hat Quay 3

0
Medium
VulnerabilityCVE-2025-4374cvecve-2025-4374
Published: Tue May 06 2025 (05/06/2025, 14:49:28 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Quay 3

Description

A flaw was found in Quay. When an organization acts as a proxy cache, and a user or robot pulls an image that hasn't been mirrored yet, they are granted "Admin" permissions on the newly created repository.

AI-Powered Analysis

AILast updated: 11/07/2025, 00:35:03 UTC

Technical Analysis

CVE-2025-4374 is a vulnerability identified in Red Hat Quay 3, a popular container image registry solution. The flaw arises when an organization acts as a proxy cache for container images. In this scenario, if a user or automated robot pulls an image that has not yet been mirrored in the proxy cache, the system incorrectly assigns 'Admin' privileges on the newly created repository to the entity initiating the pull. This privilege escalation occurs without requiring prior authentication or user interaction, making it easier to exploit remotely. The vulnerability affects the confidentiality and integrity of container repositories by allowing unauthorized users to gain administrative control, potentially enabling them to modify, delete, or expose container images. The CVSS v3.1 base score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no exploits are currently known in the wild, the flaw poses a significant risk in environments where proxy caching is used to optimize container image distribution. The absence of affected version details suggests all Red Hat Quay 3 instances with proxy cache enabled should be considered vulnerable until patched. This vulnerability highlights the importance of strict privilege assignment and validation in container registry operations.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized administrative access to container image repositories, risking the integrity and confidentiality of containerized applications. Attackers gaining admin privileges could modify images to include malicious code, disrupt deployment pipelines, or exfiltrate sensitive data embedded in container metadata. Organizations relying on Red Hat Quay 3 for container image management, especially those using proxy caching to optimize network usage, face increased risk of supply chain compromise. Critical sectors such as finance, healthcare, and government, which increasingly use containerized applications, could experience operational disruptions or data breaches. The medium CVSS score indicates a moderate but non-negligible threat, especially given the lack of required authentication and user interaction. The vulnerability could also undermine trust in container image provenance and complicate compliance with European data protection regulations if exploited.

Mitigation Recommendations

European organizations should immediately audit their Red Hat Quay 3 deployments to identify proxy cache configurations. Until an official patch is released, organizations should consider disabling proxy cache functionality or restricting access to trusted users and robots only. Implement network segmentation and firewall rules to limit external access to the Quay registry. Monitor repository creation events and privilege assignments for anomalies indicating unauthorized admin grants. Employ container image signing and verification to detect unauthorized modifications. Regularly update Red Hat Quay to the latest versions once patches addressing this vulnerability are available. Additionally, integrate container security scanning and runtime protection to detect suspicious behavior stemming from compromised images. Establish strict role-based access controls (RBAC) and enforce the principle of least privilege to minimize the impact of any unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-06T01:24:21.315Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9ec5

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 11/7/2025, 12:35:03 AM

Last updated: 11/20/2025, 4:57:31 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats