Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2092: Improper Validation of Specified Type of Input in Red Hat Red Hat build of Keycloak 26.2

0
High
VulnerabilityCVE-2026-2092cvecve-2026-2092
Published: Wed Mar 18 2026 (03/18/2026, 01:14:48 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.2

Description

CVE-2026-2092 is a high-severity vulnerability in Red Hat's build of Keycloak 26. 2 involving improper validation of encrypted SAML assertions when the overall SAML response is unsigned. An attacker possessing a valid signed SAML assertion can craft a malicious SAML response containing an encrypted assertion for an arbitrary user, enabling unauthorized access and potential data exposure. Exploitation requires network access and low privileges but no user interaction. The vulnerability impacts confidentiality, integrity, and availability due to unauthorized access and possible information disclosure. No known exploits are currently reported in the wild. Organizations using Keycloak 26. 2 for identity and access management should prioritize patching or applying mitigations to prevent exploitation. Countries with significant Keycloak deployments and critical infrastructure relying on SAML-based authentication are at higher risk.

AI-Powered Analysis

AILast updated: 03/18/2026, 01:42:56 UTC

Technical Analysis

CVE-2026-2092 is a vulnerability identified in the Red Hat build of Keycloak version 26.2, specifically affecting the Security Assertion Markup Language (SAML) broker endpoint. The flaw arises because Keycloak does not properly validate encrypted assertions within a SAML response if the overall response itself is not signed. In typical SAML workflows, assertions and responses are signed to ensure authenticity and integrity. However, this vulnerability allows an attacker who already possesses a valid signed SAML assertion to craft a malicious SAML response that includes an encrypted assertion for an arbitrary principal (user). Because the system fails to validate the encrypted assertion correctly under these conditions, the attacker can inject this assertion and gain unauthorized access to the system as that arbitrary user. This can lead to unauthorized access to protected resources and potential information disclosure. The vulnerability has a CVSS v3.1 score of 7.7, reflecting high severity, with attack vector being network-based, requiring low privileges, no user interaction, and a scope change due to compromised confidentiality and partial integrity and availability impacts. No known exploits have been reported in the wild so far. The vulnerability affects identity and access management systems relying on Keycloak 26.2, which is widely used in enterprise and cloud environments for SAML-based single sign-on (SSO).

Potential Impact

The primary impact of CVE-2026-2092 is unauthorized access to systems protected by Keycloak 26.2 using SAML authentication. Attackers can impersonate arbitrary users by injecting malicious encrypted assertions, potentially accessing sensitive data or performing unauthorized actions. This compromises confidentiality by exposing protected information, integrity by allowing unauthorized user impersonation, and availability by potentially disrupting normal authentication flows. Organizations relying on Keycloak for identity federation, especially those integrating with critical business applications or cloud services, face elevated risk of data breaches and privilege escalation. The vulnerability's network-based attack vector and low privilege requirement increase the likelihood of exploitation in environments where attackers have some network access. Although no exploits are currently known in the wild, the high severity score and the critical role of Keycloak in authentication make this a significant threat to organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2026-2092, organizations should immediately upgrade to a patched version of Red Hat's Keycloak build once available, as this is the most effective remediation. In the interim, administrators should enforce strict validation of SAML responses by configuring Keycloak to require signed SAML responses in addition to signed assertions, thereby preventing acceptance of unsigned responses containing malicious encrypted assertions. Review and tighten SAML broker endpoint configurations to limit acceptance of external assertions only from trusted identity providers. Implement network segmentation and access controls to restrict network access to Keycloak endpoints, reducing exposure to potential attackers. Monitor authentication logs for anomalous SAML assertions or unexpected user access patterns that could indicate exploitation attempts. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malformed or suspicious SAML responses. Regularly audit and update identity federation configurations to adhere to best security practices and reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-06T10:28:15.411Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9ffb5771bdb1749056703

Added to database: 3/18/2026, 1:28:21 AM

Last enriched: 3/18/2026, 1:42:56 AM

Last updated: 3/18/2026, 6:33:14 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses