Arbitrary Jwks_uri Vulnerability in Keycloak's OpenID Connect Dynamic Client Registration
CVE-2026-1180
5.8MEDIUM
What is CVE-2026-1180?
A vulnerability exists in Keycloak's OpenID Connect Dynamic Client Registration feature when clients utilize private_key_jwt for authentication. This flaw permits a client to provide an arbitrary jwks_uri, which Keycloak retrieves without proper validation. Consequently, this allows attackers to manipulate the Keycloak server into making unauthorized HTTP requests to internal or restricted network resources. Such actions heighten the risk of information disclosure and unauthorized reconnaissance on critical services and cloud metadata endpoints.
References
CVSS V3.1
Score:
5.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank lucasm0nt3s for reporting this issue.