Improper Input Validation in Keycloak by Red Hat
CVE-2026-0976
3.7LOW
What is CVE-2026-0976?
An improper input validation vulnerability exists in Keycloak, which allows remote attackers to exploit crafted requests that manipulate RFC-compliant matrix parameters in URL paths. This flaw arises from the way Keycloak interacts with common reverse proxy configurations, which may overlook or mishandle these parameters. As a result, attackers can bypass intended proxy-level path filtering, potentially gaining unauthorized access to sensitive administrative endpoints typically considered secure and not accessible from outside the network.
References
CVSS V3.1
Score:
3.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Alexander Schwartz (RedHat) for reporting this issue.