Vulnerability Description
A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot account creation, the re-authentication prompt can be bypassed. This allows a user with a timed-out session, or an attacker with access to an idle authenticated browser session, to perform privileged actions without providing valid credentials. The vulnerability enables unauthorized execution of sensitive operations despite the user interface displaying an error for invalid credentials.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Quay | 3.0.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2026-6848Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2460119Issue TrackingVendor Advisory
FAQ
What is CVE-2026-6848?
CVE-2026-6848 is a vulnerability with a CVSS score of 5.4 (MEDIUM). A flaw was found in Red Hat Quay. When Red Hat Quay requests password re-verification for sensitive operations, such as token generation or robot account creation, the re-authentication prompt can be ...
How severe is CVE-2026-6848?
CVE-2026-6848 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6848?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Quay.