Server-Side Request Forgery Vulnerability in Keycloak by Red Hat
CVE-2026-4874

3.1LOW

What is CVE-2026-4874?

A vulnerability exists in Keycloak allowing an authenticated attacker to exploit Server-Side Request Forgery (SSRF) via the manipulation of the client_session_host parameter during refresh token requests. When a Keycloak client is configured with the backchannel.logout.url utilizing the application.session.host placeholder, the attacker can send crafted requests. This enables the attacker to execute HTTP requests from the Keycloak server’s network context, putting internal networks and APIs at risk of probing and information leakage.

References

CVSS V3.1

Score:
3.1
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Evan Hendra (Independent Security Researcher) for reporting this issue.
.