CVE-2025-4374: Incorrect Privilege Assignment in Red Hat Red Hat Quay 3
A flaw was found in Quay. When an organization acts as a proxy cache, and a user or robot pulls an image that hasn't been mirrored yet, they are granted "Admin" permissions on the newly created repository.
AI Analysis
Technical Summary
CVE-2025-4374 is a vulnerability identified in Red Hat Quay 3, a popular container image registry solution. The flaw arises when an organization acts as a proxy cache for container images. In this scenario, if a user or automated robot pulls an image that has not yet been mirrored in the proxy cache, the system incorrectly assigns 'Admin' privileges on the newly created repository to the entity initiating the pull. This privilege escalation occurs without requiring prior authentication or user interaction, making it easier to exploit remotely. The vulnerability affects the confidentiality and integrity of container repositories by allowing unauthorized users to gain administrative control, potentially enabling them to modify, delete, or expose container images. The CVSS v3.1 base score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no exploits are currently known in the wild, the flaw poses a significant risk in environments where proxy caching is used to optimize container image distribution. The absence of affected version details suggests all Red Hat Quay 3 instances with proxy cache enabled should be considered vulnerable until patched. This vulnerability highlights the importance of strict privilege assignment and validation in container registry operations.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized administrative access to container image repositories, risking the integrity and confidentiality of containerized applications. Attackers gaining admin privileges could modify images to include malicious code, disrupt deployment pipelines, or exfiltrate sensitive data embedded in container metadata. Organizations relying on Red Hat Quay 3 for container image management, especially those using proxy caching to optimize network usage, face increased risk of supply chain compromise. Critical sectors such as finance, healthcare, and government, which increasingly use containerized applications, could experience operational disruptions or data breaches. The medium CVSS score indicates a moderate but non-negligible threat, especially given the lack of required authentication and user interaction. The vulnerability could also undermine trust in container image provenance and complicate compliance with European data protection regulations if exploited.
Mitigation Recommendations
European organizations should immediately audit their Red Hat Quay 3 deployments to identify proxy cache configurations. Until an official patch is released, organizations should consider disabling proxy cache functionality or restricting access to trusted users and robots only. Implement network segmentation and firewall rules to limit external access to the Quay registry. Monitor repository creation events and privilege assignments for anomalies indicating unauthorized admin grants. Employ container image signing and verification to detect unauthorized modifications. Regularly update Red Hat Quay to the latest versions once patches addressing this vulnerability are available. Additionally, integrate container security scanning and runtime protection to detect suspicious behavior stemming from compromised images. Establish strict role-based access controls (RBAC) and enforce the principle of least privilege to minimize the impact of any unauthorized access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-4374: Incorrect Privilege Assignment in Red Hat Red Hat Quay 3
Description
A flaw was found in Quay. When an organization acts as a proxy cache, and a user or robot pulls an image that hasn't been mirrored yet, they are granted "Admin" permissions on the newly created repository.
AI-Powered Analysis
Technical Analysis
CVE-2025-4374 is a vulnerability identified in Red Hat Quay 3, a popular container image registry solution. The flaw arises when an organization acts as a proxy cache for container images. In this scenario, if a user or automated robot pulls an image that has not yet been mirrored in the proxy cache, the system incorrectly assigns 'Admin' privileges on the newly created repository to the entity initiating the pull. This privilege escalation occurs without requiring prior authentication or user interaction, making it easier to exploit remotely. The vulnerability affects the confidentiality and integrity of container repositories by allowing unauthorized users to gain administrative control, potentially enabling them to modify, delete, or expose container images. The CVSS v3.1 base score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no exploits are currently known in the wild, the flaw poses a significant risk in environments where proxy caching is used to optimize container image distribution. The absence of affected version details suggests all Red Hat Quay 3 instances with proxy cache enabled should be considered vulnerable until patched. This vulnerability highlights the importance of strict privilege assignment and validation in container registry operations.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized administrative access to container image repositories, risking the integrity and confidentiality of containerized applications. Attackers gaining admin privileges could modify images to include malicious code, disrupt deployment pipelines, or exfiltrate sensitive data embedded in container metadata. Organizations relying on Red Hat Quay 3 for container image management, especially those using proxy caching to optimize network usage, face increased risk of supply chain compromise. Critical sectors such as finance, healthcare, and government, which increasingly use containerized applications, could experience operational disruptions or data breaches. The medium CVSS score indicates a moderate but non-negligible threat, especially given the lack of required authentication and user interaction. The vulnerability could also undermine trust in container image provenance and complicate compliance with European data protection regulations if exploited.
Mitigation Recommendations
European organizations should immediately audit their Red Hat Quay 3 deployments to identify proxy cache configurations. Until an official patch is released, organizations should consider disabling proxy cache functionality or restricting access to trusted users and robots only. Implement network segmentation and firewall rules to limit external access to the Quay registry. Monitor repository creation events and privilege assignments for anomalies indicating unauthorized admin grants. Employ container image signing and verification to detect unauthorized modifications. Regularly update Red Hat Quay to the latest versions once patches addressing this vulnerability are available. Additionally, integrate container security scanning and runtime protection to detect suspicious behavior stemming from compromised images. Establish strict role-based access controls (RBAC) and enforce the principle of least privilege to minimize the impact of any unauthorized access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-06T01:24:21.315Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9ec5
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 11/7/2025, 12:35:03 AM
Last updated: 11/20/2025, 4:57:31 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64027: n/a
UnknownCVE-2025-52410: n/a
HighCVE-2025-13437: CWE-706 Use of Incorrectly-Resolved Name or Reference in Google zx
MediumCVE-2024-31405
LowCVE-2025-62875: CWE-754: Improper Check for Unusual or Exceptional Conditions in SUSE openSUSE Tumbleweed
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.