CVE-2026-4366

Published Mar 18, 2026

Last updated 15 days ago

Overview

Description
A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintended requests to internal or restricted resources. As a result, sensitive internal services such as cloud metadata endpoints could be accessed. This issue may lead to information disclosure and enable attackers to map internal network infrastructure.
Source
secalert@redhat.com
NVD status
Analyzed
Products
build_of_keycloak, jboss_enterprise_application_platform, jboss_enterprise_application_platform_expansion_pack, single_sign-on

Risk scores

CVSS 3.1

Type
Primary
Base score
5.8
Impact score
1.4
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Severity
MEDIUM

Weaknesses

secalert@redhat.com
CWE-918

Social media

Hype score
Not currently trending

Configurations