CVE-2026-2733

LOW

Keycloak Docker v2 - Auth Bypass

Title source: llm

Description

A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.

Scores

CVSS v3 3.8
EPSS 0.0007
EPSS Percentile 21.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

Classification

CWE
CWE-285
Status draft

Affected Products (1)

org.keycloak/keycloak-services Maven

Timeline

Published Feb 19, 2026
Tracked Since Feb 19, 2026