Keycloak Vulnerability in Single Use Object Provider Allows Unauthorized Access
CVE-2026-4325
5.3MEDIUM
Key Information:
- Vendor
Red Hat
- Status
- Vendor
- CVE Published:
- 2 April 2026
What is CVE-2026-4325?
A flaw in Keycloak's SingleUseObjectProvider, a global key-value store, compromises type and namespace isolation. This vulnerability allows attackers to delete arbitrary single-use entries, which can lead to replay attacks on consumed action tokens such as password reset links, potentially resulting in unauthorized access or account compromise.
Affected Version(s)
Red Hat build of Keycloak 26.2 26.2.15-1
Red Hat build of Keycloak 26.2 26.2-18
Red Hat build of Keycloak 26.2 26.2-18
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Ngọc Chung Kim for reporting this issue.