Server-Side Request Forgery Vulnerability in Keycloak by Red Hat
CVE-2026-4874
3.1LOW
What is CVE-2026-4874?
A vulnerability exists in Keycloak allowing an authenticated attacker to exploit Server-Side Request Forgery (SSRF) via the manipulation of the client_session_host parameter during refresh token requests. When a Keycloak client is configured with the backchannel.logout.url utilizing the application.session.host placeholder, the attacker can send crafted requests. This enables the attacker to execute HTTP requests from the Keycloak server’s network context, putting internal networks and APIs at risk of probing and information leakage.
References
CVSS V3.1
Score:
3.1
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Evan Hendra (Independent Security Researcher) for reporting this issue.