<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4634 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4634/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 13:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4634/feed.xml" rel="self" type="application/rss+xml"/><item><title>Keycloak Denial-of-Service Vulnerability via Excessive Scope Parameter (CVE-2026-4634)</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-dos/</link><pubDate>Thu, 02 Apr 2026 13:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-dos/</guid><description>An unauthenticated attacker can cause a denial-of-service on Keycloak servers by sending a crafted POST request to the OIDC token endpoint with an excessively long scope parameter, leading to high resource consumption.</description><content:encoded><![CDATA[<p>CVE-2026-4634 describes a denial-of-service vulnerability affecting Keycloak servers. This vulnerability allows an unauthenticated attacker to exhaust server resources by sending a specially crafted HTTP POST request to the OpenID Connect (OIDC) token endpoint. The malicious request includes an excessively long scope parameter, which forces the Keycloak server to consume significant processing time and memory. This can result in prolonged processing times for legitimate requests and ultimately a denial of service for all users of the affected Keycloak instance. The vulnerability was reported on April 2, 2026, and affects unpatched versions of Keycloak. Defenders should prioritize patching and consider implementing rate limiting to mitigate the impact of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Keycloak instance.</li>
<li>The attacker crafts an HTTP POST request targeted at the OIDC token endpoint (e.g., <code>/auth/realms/{realm-name}/protocol/openid-connect/token</code>).</li>
<li>The attacker includes a <code>scope</code> parameter in the POST request.</li>
<li>The attacker sets the value of the <code>scope</code> parameter to an extremely long string, causing the Keycloak server to allocate excessive resources when processing it.</li>
<li>The attacker sends the malicious POST request to the Keycloak server.</li>
<li>The Keycloak server attempts to process the excessively long <code>scope</code> parameter, consuming CPU and memory resources.</li>
<li>Repeated requests from the attacker further exhaust server resources.</li>
<li>The Keycloak server becomes unresponsive, leading to a denial of service for legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4634 results in a denial-of-service condition, rendering the Keycloak server unavailable. This impacts all applications and services relying on Keycloak for authentication and authorization. The number of affected users depends on the size and criticality of the Keycloak deployment. Organizations in any sector using Keycloak are potentially vulnerable. Unavailability can disrupt business operations, impacting productivity and revenue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch released by Red Hat/Keycloak to address CVE-2026-4634 to eliminate the vulnerability.</li>
<li>Implement rate limiting on the OIDC token endpoint to restrict the number of requests from a single IP address within a given timeframe.</li>
<li>Monitor web server logs for suspicious POST requests to the OIDC token endpoint with unusually long <code>scope</code> parameters to detect potential exploitation attempts and deploy the Sigma rule <code>Detect Suspiciously Long Scope Parameter</code>.</li>
<li>Consider deploying a web application firewall (WAF) rule to block requests with excessively long scope parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4634</category><category>denial-of-service</category><category>keycloak</category></item></channel></rss>