CVE-2025-4374

6.5 MEDIUM

📋 TL;DR

A privilege escalation vulnerability in Quay container registry allows users or robots to gain administrative permissions on newly created repositories when pulling unmirrored images through an organization proxy cache. This affects Quay deployments where organizations are configured as proxy caches.

💻 Affected Systems

Products:
  • Red Hat Quay
Versions: Specific versions not yet published in advisory
Operating Systems: Linux
Default Config Vulnerable: ✅ No
Notes: Only affects Quay deployments where organizations are configured as proxy caches for external registries.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative control over repositories, allowing them to push malicious images, delete legitimate images, or modify repository configurations.

🟠

Likely Case

Accidental privilege escalation where legitimate users gain unintended admin access to repositories they shouldn't control.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, though unauthorized admin access could still occur.

🌐 Internet-Facing: MEDIUM - Requires authenticated access to Quay and specific proxy cache configuration.
🏢 Internal Only: MEDIUM - Internal users with access to Quay could exploit this if proxy caching is enabled.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Quay and pulling an image that hasn't been mirrored through a proxy cache organization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat advisory for specific fixed versions

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-4374

Restart Required: Yes

Instructions:

1. Check Red Hat advisory for fixed Quay version
2. Update Quay to patched version
3. Restart Quay services
4. Verify proxy cache functionality

🔧 Temporary Workarounds

Disable proxy cache organizations

linux

Temporarily disable organizations acting as proxy caches until patched

# Modify Quay configuration to remove proxy cache settings
# Restart Quay services

Restrict image pulling permissions

all

Limit which users/robots can pull images through proxy cache organizations

# Adjust Quay organization and repository permissions
# Review and tighten robot account permissions

🧯 If You Can't Patch

  • Disable proxy cache functionality in all organizations
  • Implement strict monitoring for repository permission changes and admin access

🔍 How to Verify

Check if Vulnerable:

Check if any Quay organizations are configured as proxy caches and review repository permission assignments

Check Version:

quay --version or check Quay container image tag

Verify Fix Applied:

After patching, test pulling unmirrored images through proxy cache and verify no admin permissions are granted

📡 Detection & Monitoring

Log Indicators:

  • Unexpected repository creation events
  • Permission escalation logs showing users gaining admin access
  • Proxy cache pull requests for unmirrored images

Network Indicators:

  • Increased image pull requests through proxy cache organizations
  • Unusual repository configuration changes

SIEM Query:

search 'repository created' AND 'admin permission granted' OR 'proxy cache pull'

🔗 References

📤 Share & Export