CVE-2026-4874

LOW

Org.keycloak.protocol.oidc.grants: org.keycloak.services.managers: keycloak: server-side request forgery via oidc token endpoint manipulation

Title source: cna

Description

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.

Scores

CVSS v3 3.1
EPSS 0.0002
EPSS Percentile 6.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Details

CWE
CWE-918
Status published
Products (9)
org.keycloak/keycloak-services 0Maven
Red Hat/Red Hat Build of Keycloak
Red Hat/Red Hat JBoss Enterprise Application Platform 8
Red Hat/Red Hat JBoss Enterprise Application Platform Expansion Pack
Red Hat/Red Hat Single Sign-On 7
redhat/build_of_keycloak
redhat/jboss_enterprise_application_platform 8.0.0
redhat/jboss_enterprise_application_platform_expansion_pack
redhat/single_sign-on 7.0
Published Mar 26, 2026
Tracked Since Mar 26, 2026