Arbitrary Jwks_uri Vulnerability in Keycloak's OpenID Connect Dynamic Client Registration
CVE-2026-1180

5.8MEDIUM

What is CVE-2026-1180?

A vulnerability exists in Keycloak's OpenID Connect Dynamic Client Registration feature when clients utilize private_key_jwt for authentication. This flaw permits a client to provide an arbitrary jwks_uri, which Keycloak retrieves without proper validation. Consequently, this allows attackers to manipulate the Keycloak server into making unauthorized HTTP requests to internal or restricted network resources. Such actions heighten the risk of information disclosure and unauthorized reconnaissance on critical services and cloud metadata endpoints.

References

CVSS V3.1

Score:
5.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank lucasm0nt3s for reporting this issue.
.