Description
A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.
References (6)
Scores
CVSS v3
8.8
EPSS
0.0038
EPSS Percentile
59.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-305
Status
published
Products (7)
org.keycloak/keycloak-broker-saml
0Maven
redhat/build_of_keycloak
redhat/build_of_keycloak
26.2
redhat/build_of_keycloak
26.2.14
redhat/build_of_keycloak
26.4
redhat/build_of_keycloak
26.4.10
redhat/keycloak
Published
Mar 05, 2026
Tracked Since
Mar 06, 2026