Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3911: Exposure of Private Personal Information to an Unauthorized Actor in Red Hat Red Hat build of Keycloak 26.4

0
Low
VulnerabilityCVE-2026-3911cvecve-2026-3911
Published: Wed Mar 11 2026 (03/11/2026, 05:36:43 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.4

Description

A flaw was found in Keycloak. An authenticated user with the view-users role could exploit a vulnerability in the UserResource component. By accessing a specific administrative endpoint, this user could improperly retrieve user attributes that were configured to be hidden. This unauthorized information disclosure could expose sensitive user data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:21:31 UTC

Technical Analysis

The vulnerability identified as CVE-2026-3911 affects the Red Hat build of Keycloak version 26.4. It involves improper access control in the UserResource component, where an authenticated user possessing the view-users role can exploit a flaw to retrieve user attributes that are intended to be hidden from their view. This administrative endpoint does not adequately enforce attribute-level access restrictions, resulting in unauthorized disclosure of private personal information. The flaw does not require user interaction but does require the attacker to be authenticated with a specific role, limiting the attack surface. The vulnerability impacts confidentiality by exposing sensitive user data but does not affect data integrity or system availability. The CVSS 3.1 base score is 2.7, reflecting a low severity due to the requirement for authenticated access with elevated privileges and the limited scope of data exposure. No public exploits have been reported, and no patches were linked at the time of publication. The issue highlights the importance of strict enforcement of attribute-level access controls within identity and access management platforms like Keycloak.

Potential Impact

The primary impact of CVE-2026-3911 is the unauthorized disclosure of sensitive user attributes that were configured to be hidden, potentially exposing private personal information. For organizations, this could lead to privacy violations, regulatory compliance issues (such as GDPR or CCPA), and erosion of user trust. Although the vulnerability requires authenticated access with the view-users role, insider threats or compromised accounts with this role could exploit the flaw. The exposure is limited to confidentiality and does not affect system integrity or availability, reducing the overall risk. However, in environments where Keycloak is used as a central identity provider for critical applications, even limited data leakage could facilitate further targeted attacks or social engineering. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for remediation.

Mitigation Recommendations

Organizations should immediately audit and restrict the assignment of the view-users role to only trusted administrators to minimize exposure. Monitoring and logging access to administrative endpoints should be enhanced to detect suspicious activity. Since no patch links were provided at the time of disclosure, organizations should stay alert for official updates or patches from Red Hat and apply them promptly once available. As a proactive measure, consider implementing additional attribute-level access controls or custom filters within Keycloak to enforce stricter data visibility policies. Regularly review and update Keycloak configurations to ensure that sensitive attributes are not unnecessarily exposed. Employ multi-factor authentication for administrative accounts to reduce the risk of credential compromise. Finally, conduct periodic security assessments and penetration tests focusing on identity management components to identify similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-03-11T03:32:12.979Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b104d42f860ef943326c64

Added to database: 3/11/2026, 5:59:48 AM

Last enriched: 4/3/2026, 3:21:31 AM

Last updated: 4/28/2026, 7:28:59 AM

Views: 182

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses