SAML Brokering Flaw in Keycloak Affects Session Validity
CVE-2026-1190

3.1LOW

What is CVE-2026-1190?

A vulnerability exists in Keycloak's handling of Security Assertion Markup Language (SAML) responses. Specifically, when configured as a SAML client, Keycloak does not properly validate the 'NotOnOrAfter' timestamp in the 'SubjectConfirmationData'. This oversight potentially enables attackers to manipulate the lifespan of SAML assertions, prolonging session validity and causing unintended resource usage or extended access to applications. Organizations utilizing Keycloak for SAML-based authentication should evaluate their configurations and ensure robust session management practices.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
3.1
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Franz Bettag (Bettag Systems) for reporting this issue.
.