CVE-2026-3047

HIGH

Keycloak - Auth Bypass

Title source: llm
STIX 2.1

Description

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.

Scores

CVSS v3 8.8
EPSS 0.0038
EPSS Percentile 59.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-305
Status published
Products (7)
org.keycloak/keycloak-broker-saml 0Maven
redhat/build_of_keycloak
redhat/build_of_keycloak 26.2
redhat/build_of_keycloak 26.2.14
redhat/build_of_keycloak 26.4
redhat/build_of_keycloak 26.4.10
redhat/keycloak
Published Mar 05, 2026
Tracked Since Mar 06, 2026