CVE-2026-4874

Published Mar 26, 2026

Last updated 15 days ago

Overview

Description
A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.
Source
secalert@redhat.com
NVD status
Analyzed
Products
build_of_keycloak, jboss_enterprise_application_platform, jboss_enterprise_application_platform_expansion_pack, single_sign-on

Risk scores

CVSS 3.1

Type
Primary
Base score
3.1
Impact score
1.4
Exploitability score
1.6
Vector string
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Severity
LOW

Weaknesses

secalert@redhat.com
CWE-918

Social media

Hype score
Not currently trending

Configurations