Keycloak Vulnerability Allows Unauthorized Access via Invitation Token Manipulation
CVE-2026-1529

8.1HIGH

Key Information:

Badges

πŸ“ˆ Score: 326πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2026-1529?

CVE-2026-1529 is a security vulnerability found in Keycloak, an open-source identity and access management solution maintained by Red Hat. Keycloak allows organizations to manage user identities, facilitate single sign-on, and provide secure access control to applications. The vulnerability involves a flaw that permits attackers to manipulate the JSON Web Token (JWT) payload of a legitimate invitation token. By altering the organization ID and target email within this token, an unauthorized actor can successfully register themselves with an organization, effectively gaining access without proper authorization. This compromise can lead to significant risks for organizations, as it circumvents established security measures and may allow malicious users to exploit the system further.

Potential impact of CVE-2026-1529

  1. Unauthorized Access to Sensitive Information: Exploitation of this vulnerability can enable attackers to gain access to sensitive organizational data, including user information and internal resources, potentially leading to data breaches.

  2. Loss of Trust and Reputation: If organizations are victims of unauthorized access due to this vulnerability, it may result in a loss of trust among users and stakeholders, impacting reputation and customer loyalty.

  3. Regulatory and Compliance Risks: Organizations failing to secure their systems against such vulnerabilities may face legal and regulatory repercussions, particularly if compromised data includes protected personal or sensitive information, leading to fines and operational directives.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Red Hat build of Keycloak 26.2 26.2.13-1

Red Hat build of Keycloak 26.2 26.2-15

Red Hat build of Keycloak 26.2 26.2-15

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.