Token Management Flaw in Keycloak Server by Red Hat
CVE-2026-1035

3.1LOW

What is CVE-2026-1035?

A vulnerability in the Keycloak server arises during the processing of refresh tokens. The issue is located within the TokenManager class, which is responsible for enforcing policies related to refresh token reuse. When strict rotation of refresh tokens is implemented, the lack of atomicity in validating and updating refresh token usage permits simultaneous refresh requests to circumvent the single-use policy. This can lead to unauthorized multiple access token issuance from the same refresh token, compromising the intended security measures associated with token rotation.

References

CVSS V3.1

Score:
3.1
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Mohamed Amine ait Ouchebou (mrecho) (Indiesecurity) for reporting this issue.
.