<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Keycloak — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/keycloak/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 07:33:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/keycloak/feed.xml" rel="self" type="application/rss+xml"/><item><title>Keycloak Cross-Site Scripting Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-xss/</link><pubDate>Wed, 15 Apr 2026 07:33:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-xss/</guid><description>An authenticated remote attacker can exploit a vulnerability in Keycloak to perform a Cross-Site Scripting attack, potentially leading to unauthorized access and data compromise.</description><content:encoded><![CDATA[<p>A Cross-Site Scripting (XSS) vulnerability exists within Keycloak, a widely-used open-source identity and access management solution. This vulnerability allows a remote, authenticated attacker to inject malicious scripts into web pages viewed by other users. The attacker must possess valid credentials to initially access the vulnerable Keycloak instance. While the specific version affected is not provided in this advisory, it&rsquo;s crucial for organizations using Keycloak to investigate and apply necessary patches or mitigations. The impact of successful exploitation ranges from defacement to sensitive data theft and account compromise. Defenders should prioritize patching Keycloak installations and implementing input validation to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Keycloak instance with valid credentials.</li>
<li>Attacker identifies a vulnerable input field or parameter within the Keycloak application (e.g., user profile, group name, etc.).</li>
<li>Attacker crafts a malicious payload containing JavaScript code.</li>
<li>Attacker injects the malicious payload into the vulnerable input field.</li>
<li>The Keycloak application stores the malicious payload without proper sanitization.</li>
<li>A victim user (e.g., another authenticated user or an administrator) accesses the page containing the injected payload.</li>
<li>The victim&rsquo;s browser executes the malicious JavaScript code.</li>
<li>The attacker can then steal cookies, redirect the user to a malicious site, or perform other actions on behalf of the victim.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability can lead to several negative consequences. An attacker could potentially steal session cookies, allowing them to impersonate other users, including administrators. This could grant them unauthorized access to sensitive data, configuration settings, and management functions. Furthermore, the attacker could deface the Keycloak interface, inject phishing scams, or redirect users to malicious websites. The number of victims depends on the number of users accessing the page with the injected XSS payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement input validation and output encoding to prevent XSS attacks within Keycloak.</li>
<li>Review Keycloak access logs for suspicious activity related to user profiles and injected scripts.</li>
<li>Deploy the Sigma rule to detect possible XSS attempts in Keycloak logs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>keycloak</category><category>xss</category><category>cross-site scripting</category><category>cloud</category></item><item><title>Keycloak UMA Policy Bypass Vulnerability (CVE-2026-4636)</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-uma-bypass/</link><pubDate>Thu, 02 Apr 2026 13:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-uma-bypass/</guid><description>CVE-2026-4636 describes a vulnerability in Keycloak where an authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation, leading to unauthorized access to victim-owned resources.</description><content:encoded><![CDATA[<p>A vulnerability, identified as CVE-2026-4636, has been discovered in Keycloak, a popular open-source identity and access management solution. This flaw allows an authenticated user who possesses the <code>uma_protection</code> role to bypass User-Managed Access (UMA) policy validation. By exploiting this vulnerability, an attacker can manipulate policy creation requests to include resource identifiers that belong to other users. This circumvents the intended access controls and enables the attacker to gain unauthorized permissions to resources owned by victims. The scope of the attack is limited to Keycloak instances where UMA is enabled and users have the <code>uma_protection</code> role. This can lead to significant data breaches and unauthorized actions performed under the guise of legitimate users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to Keycloak with an account that has the <code>uma_protection</code> role.</li>
<li>The attacker initiates a request to create a new UMA policy.</li>
<li>The attacker crafts the policy creation request to include resource identifiers that belong to other users. This is done even though the URL path in the request specifies a resource owned by the attacker.</li>
<li>The UMA policy validation mechanism fails to properly verify the ownership of the included resource identifiers.</li>
<li>Keycloak creates the UMA policy, granting the attacker unauthorized permissions to the victim-owned resources.</li>
<li>The attacker obtains a Requesting Party Token (RPT) for the victim&rsquo;s resources using the newly created policy.</li>
<li>The attacker uses the RPT to access the victim&rsquo;s resources, potentially accessing sensitive information.</li>
<li>The attacker performs unauthorized actions on the victim&rsquo;s resources, leveraging the gained permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4636 allows an attacker to gain unauthorized access to resources managed by Keycloak. This can lead to the exposure of sensitive data, such as personal information, financial records, or confidential business documents. The number of affected users depends on the scope of the attacker&rsquo;s access and the number of resources they can compromise. The impact could range from individual account compromise to widespread data breaches affecting entire organizations relying on Keycloak for access control.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Keycloak that resolves CVE-2026-4636 as soon as it becomes available.</li>
<li>Monitor Keycloak logs for suspicious UMA policy creation requests that include resource identifiers not owned by the requesting user. Create a Sigma rule based on webserver logs and filter for POST requests on <code>/auth/realms/&lt;realm&gt;/authz/protection/uma-policy/</code> with suspicious resource IDs in the body.</li>
<li>Implement additional access controls and validation mechanisms to verify the ownership of resource identifiers during UMA policy creation.</li>
<li>Review existing UMA policies to identify and remove any policies that may have been created maliciously using this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>keycloak</category><category>uma</category><category>policy-bypass</category><category>privilege-escalation</category></item><item><title>Keycloak Denial-of-Service Vulnerability via Excessive Scope Parameter (CVE-2026-4634)</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-dos/</link><pubDate>Thu, 02 Apr 2026 13:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-dos/</guid><description>An unauthenticated attacker can cause a denial-of-service on Keycloak servers by sending a crafted POST request to the OIDC token endpoint with an excessively long scope parameter, leading to high resource consumption.</description><content:encoded><![CDATA[<p>CVE-2026-4634 describes a denial-of-service vulnerability affecting Keycloak servers. This vulnerability allows an unauthenticated attacker to exhaust server resources by sending a specially crafted HTTP POST request to the OpenID Connect (OIDC) token endpoint. The malicious request includes an excessively long scope parameter, which forces the Keycloak server to consume significant processing time and memory. This can result in prolonged processing times for legitimate requests and ultimately a denial of service for all users of the affected Keycloak instance. The vulnerability was reported on April 2, 2026, and affects unpatched versions of Keycloak. Defenders should prioritize patching and consider implementing rate limiting to mitigate the impact of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Keycloak instance.</li>
<li>The attacker crafts an HTTP POST request targeted at the OIDC token endpoint (e.g., <code>/auth/realms/{realm-name}/protocol/openid-connect/token</code>).</li>
<li>The attacker includes a <code>scope</code> parameter in the POST request.</li>
<li>The attacker sets the value of the <code>scope</code> parameter to an extremely long string, causing the Keycloak server to allocate excessive resources when processing it.</li>
<li>The attacker sends the malicious POST request to the Keycloak server.</li>
<li>The Keycloak server attempts to process the excessively long <code>scope</code> parameter, consuming CPU and memory resources.</li>
<li>Repeated requests from the attacker further exhaust server resources.</li>
<li>The Keycloak server becomes unresponsive, leading to a denial of service for legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4634 results in a denial-of-service condition, rendering the Keycloak server unavailable. This impacts all applications and services relying on Keycloak for authentication and authorization. The number of affected users depends on the size and criticality of the Keycloak deployment. Organizations in any sector using Keycloak are potentially vulnerable. Unavailability can disrupt business operations, impacting productivity and revenue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch released by Red Hat/Keycloak to address CVE-2026-4634 to eliminate the vulnerability.</li>
<li>Implement rate limiting on the OIDC token endpoint to restrict the number of requests from a single IP address within a given timeframe.</li>
<li>Monitor web server logs for suspicious POST requests to the OIDC token endpoint with unusually long <code>scope</code> parameters to detect potential exploitation attempts and deploy the Sigma rule <code>Detect Suspiciously Long Scope Parameter</code>.</li>
<li>Consider deploying a web application firewall (WAF) rule to block requests with excessively long scope parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4634</category><category>denial-of-service</category><category>keycloak</category></item><item><title>Keycloak Redirect URI Bypass Vulnerability (CVE-2026-3872)</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-redirect-bypass/</link><pubDate>Thu, 02 Apr 2026 13:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-redirect-bypass/</guid><description>CVE-2026-3872 is a vulnerability in Keycloak that allows an attacker controlling a path on the same web server to bypass URI redirect validation using a wildcard, potentially leading to access token theft and information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-3872 is a security flaw found in Keycloak, a popular open-source identity and access management solution. This vulnerability allows a malicious actor who has control over another path on the same web server hosting Keycloak to circumvent the allowed path restrictions in redirect URIs that use a wildcard. By exploiting this weakness, an attacker can potentially redirect a user to a malicious site after authentication, intercept the access token, and gain unauthorized access to the user&rsquo;s resources. The vulnerability could lead to the disclosure of sensitive information and potentially compromise user accounts. This was published on April 2, 2026, and has a CVSS v3.1 score of 7.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains control of a path on the same web server hosting the Keycloak instance. This could be achieved through various means, such as exploiting a separate vulnerability in another application hosted on the server.</li>
<li>The attacker crafts a malicious URL that exploits the wildcard redirect URI validation flaw in Keycloak. The crafted URL includes a redirect URI that bypasses the intended restrictions.</li>
<li>A legitimate user initiates an authentication request to Keycloak, potentially through a vulnerable application relying on Keycloak for authentication.</li>
<li>Keycloak processes the authentication request and, due to the vulnerability, accepts the attacker&rsquo;s crafted redirect URI as valid.</li>
<li>Keycloak redirects the user to the attacker-controlled URL after successful authentication.</li>
<li>The attacker&rsquo;s server captures the access token from the redirect URI.</li>
<li>The attacker uses the stolen access token to impersonate the user and access protected resources.</li>
<li>The attacker gains unauthorized access to sensitive information or performs actions on behalf of the user, leading to information disclosure or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3872 can lead to the theft of access tokens, enabling unauthorized access to user accounts and sensitive data. This could result in the compromise of user privacy, financial loss, or reputational damage for organizations relying on affected Keycloak instances. The impact is significant because Keycloak is used across various sectors to secure web applications and APIs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches or updates provided by Red Hat for Keycloak to address CVE-2026-3872. Refer to the Red Hat advisory linked in the references for specific instructions.</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts of CVE-2026-3872 based on suspicious redirect URIs in web server logs.</li>
<li>Review and harden the configuration of redirect URIs in Keycloak, avoiding the use of wildcards where possible and implementing stricter validation rules.</li>
<li>Monitor web server logs for suspicious activity related to redirect URIs, looking for unusual patterns or attempts to access unauthorized resources.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>keycloak</category><category>redirect-uri-bypass</category><category>cve-2026-3872</category><category>authentication</category><category>authorization</category></item><item><title>Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-privesc/</link><pubDate>Thu, 02 Apr 2026 13:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-privesc/</guid><description>An unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.</description><content:encoded><![CDATA[<p>CVE-2026-4282 identifies a critical vulnerability within the Keycloak authentication server, specifically affecting the SingleUseObjectProvider. This component, responsible for managing single-use key-value pairs, suffers from a lack of sufficient type and namespace isolation. The absence of proper isolation mechanisms allows a remote, unauthenticated attacker to manipulate the system by forging authorization codes. Successful exploitation allows for the creation of access tokens with administrative privileges. The vulnerability was published on April 2, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted request to the Keycloak server to initiate the authorization flow.</li>
<li>The attacker leverages the lack of type and namespace isolation in the SingleUseObjectProvider.</li>
<li>The attacker forges a valid authorization code using the vulnerability.</li>
<li>The attacker presents the forged authorization code to the token endpoint.</li>
<li>Keycloak validates the forged code due to the flawed SingleUseObjectProvider logic.</li>
<li>The attacker receives an access token with elevated (admin) privileges.</li>
<li>The attacker uses the admin-capable access token to perform administrative actions.</li>
<li>The attacker gains full control over Keycloak resources and user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4282 allows a remote attacker to gain full administrative control over a Keycloak instance. This can lead to the compromise of all applications and services relying on Keycloak for authentication and authorization. The impact includes data breaches, account takeovers, and the potential for widespread service disruption. Given Keycloak&rsquo;s prevalence in securing web applications and APIs, the vulnerability poses a significant risk to organizations using affected versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Keycloak that resolves CVE-2026-4282 as soon as it becomes available from Red Hat.</li>
<li>Monitor Keycloak logs (webserver category, linux product) for suspicious requests to the authorization and token endpoints indicative of authorization code forging attempts.</li>
<li>Implement stricter input validation and sanitization on the authorization code parameter to mitigate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>keycloak</category><category>privilege-escalation</category><category>authorization</category></item></channel></rss>