Improper Input Validation in Keycloak by Red Hat
CVE-2026-0976

3.7LOW

What is CVE-2026-0976?

An improper input validation vulnerability exists in Keycloak, which allows remote attackers to exploit crafted requests that manipulate RFC-compliant matrix parameters in URL paths. This flaw arises from the way Keycloak interacts with common reverse proxy configurations, which may overlook or mishandle these parameters. As a result, attackers can bypass intended proxy-level path filtering, potentially gaining unauthorized access to sensitive administrative endpoints typically considered secure and not accessible from outside the network.

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Alexander Schwartz (RedHat) for reporting this issue.
.