Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3009: Improper Authorization in Red Hat Red Hat build of Keycloak 26.4

0
High
VulnerabilityCVE-2026-3009cvecve-2026-3009
Published: Thu Mar 05 2026 (03/05/2026, 18:27:43 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.4

Description

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the administrative restriction. This undermines access control enforcement and may allow unauthorized authentication through a disabled external provider.

AI-Powered Analysis

AILast updated: 03/05/2026, 19:03:05 UTC

Technical Analysis

CVE-2026-3009 is a security vulnerability identified in the Red Hat Build of Keycloak, specifically in the IdentityBrokerService.performLogin endpoint. Keycloak is an open-source identity and access management solution widely used for single sign-on (SSO) and identity federation. The flaw allows an attacker to bypass administrative restrictions that disable an external Identity Provider (IdP). Normally, when an administrator disables an IdP, authentication requests through that provider should be rejected. However, due to improper authorization checks, an attacker who knows the alias of the disabled IdP can reuse a previously generated login request to authenticate successfully. This bypass undermines the access control mechanisms intended to prevent unauthorized authentication via disabled IdPs. The vulnerability does not require user interaction and can be exploited remotely over the network with low privileges, making it easier to exploit. The flaw impacts the confidentiality and integrity of authentication processes by allowing unauthorized access without alerting administrators. Although no known exploits are reported in the wild yet, the high CVSS score (8.1) indicates a significant risk. The vulnerability affects all deployments of Red Hat Build of Keycloak that use external IdPs and rely on administrative disabling of these providers for access control. Since Keycloak is widely used in enterprise environments for identity federation, this vulnerability poses a substantial risk to organizations relying on it for secure authentication.

Potential Impact

The impact of CVE-2026-3009 is significant for organizations using Red Hat Build of Keycloak for identity federation and single sign-on. Unauthorized authentication through a disabled IdP can lead to unauthorized access to sensitive systems and data, compromising confidentiality and integrity. Attackers can bypass administrative controls designed to restrict access, potentially gaining persistent footholds in enterprise environments. This can facilitate lateral movement, data exfiltration, and privilege escalation within affected networks. The vulnerability does not affect availability directly but can severely undermine trust in the authentication infrastructure. Organizations in sectors such as finance, healthcare, government, and technology that rely on Keycloak for secure identity management are particularly at risk. The ease of exploitation and lack of user interaction required increase the likelihood of exploitation attempts once public details become widespread. The absence of known exploits in the wild currently provides a window for mitigation before active attacks emerge.

Mitigation Recommendations

Organizations should prioritize applying official patches or updates from Red Hat as soon as they become available to address CVE-2026-3009. In the interim, administrators should audit their Keycloak configurations to identify any disabled IdPs and verify that no legacy or cached login requests can be reused. Implement strict monitoring and logging of authentication attempts, focusing on unusual reuse of login requests or authentication from disabled IdPs. Consider temporarily disabling or removing unused or legacy IdPs to reduce attack surface. Employ network-level controls such as Web Application Firewalls (WAFs) to detect and block suspicious authentication requests. Review and tighten access controls around Keycloak administrative functions to prevent unauthorized changes to IdP configurations. Educate security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts. Finally, maintain an incident response plan tailored to identity management compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-23T05:16:36.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a9d16b61e8e69ef5d12490

Added to database: 3/5/2026, 6:54:35 PM

Last enriched: 3/5/2026, 7:03:05 PM

Last updated: 3/5/2026, 8:38:42 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses