CVE-2026-3911: Exposure of Private Personal Information to an Unauthorized Actor in Red Hat Red Hat build of Keycloak 26.4
A flaw was found in Keycloak. An authenticated user with the view-users role could exploit a vulnerability in the UserResource component. By accessing a specific administrative endpoint, this user could improperly retrieve user attributes that were configured to be hidden. This unauthorized information disclosure could expose sensitive user data.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-3911 affects the Red Hat build of Keycloak version 26.4. It involves improper access control in the UserResource component, where an authenticated user possessing the view-users role can exploit a flaw to retrieve user attributes that are intended to be hidden from their view. This administrative endpoint does not adequately enforce attribute-level access restrictions, resulting in unauthorized disclosure of private personal information. The flaw does not require user interaction but does require the attacker to be authenticated with a specific role, limiting the attack surface. The vulnerability impacts confidentiality by exposing sensitive user data but does not affect data integrity or system availability. The CVSS 3.1 base score is 2.7, reflecting a low severity due to the requirement for authenticated access with elevated privileges and the limited scope of data exposure. No public exploits have been reported, and no patches were linked at the time of publication. The issue highlights the importance of strict enforcement of attribute-level access controls within identity and access management platforms like Keycloak.
Potential Impact
The primary impact of CVE-2026-3911 is the unauthorized disclosure of sensitive user attributes that were configured to be hidden, potentially exposing private personal information. For organizations, this could lead to privacy violations, regulatory compliance issues (such as GDPR or CCPA), and erosion of user trust. Although the vulnerability requires authenticated access with the view-users role, insider threats or compromised accounts with this role could exploit the flaw. The exposure is limited to confidentiality and does not affect system integrity or availability, reducing the overall risk. However, in environments where Keycloak is used as a central identity provider for critical applications, even limited data leakage could facilitate further targeted attacks or social engineering. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
Organizations should immediately audit and restrict the assignment of the view-users role to only trusted administrators to minimize exposure. Monitoring and logging access to administrative endpoints should be enhanced to detect suspicious activity. Since no patch links were provided at the time of disclosure, organizations should stay alert for official updates or patches from Red Hat and apply them promptly once available. As a proactive measure, consider implementing additional attribute-level access controls or custom filters within Keycloak to enforce stricter data visibility policies. Regularly review and update Keycloak configurations to ensure that sensitive attributes are not unnecessarily exposed. Employ multi-factor authentication for administrative accounts to reduce the risk of credential compromise. Finally, conduct periodic security assessments and penetration tests focusing on identity management components to identify similar weaknesses.
Affected Countries
United States, Germany, United Kingdom, France, India, Japan, Canada, Australia, Brazil, South Korea
CVE-2026-3911: Exposure of Private Personal Information to an Unauthorized Actor in Red Hat Red Hat build of Keycloak 26.4
Description
A flaw was found in Keycloak. An authenticated user with the view-users role could exploit a vulnerability in the UserResource component. By accessing a specific administrative endpoint, this user could improperly retrieve user attributes that were configured to be hidden. This unauthorized information disclosure could expose sensitive user data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-3911 affects the Red Hat build of Keycloak version 26.4. It involves improper access control in the UserResource component, where an authenticated user possessing the view-users role can exploit a flaw to retrieve user attributes that are intended to be hidden from their view. This administrative endpoint does not adequately enforce attribute-level access restrictions, resulting in unauthorized disclosure of private personal information. The flaw does not require user interaction but does require the attacker to be authenticated with a specific role, limiting the attack surface. The vulnerability impacts confidentiality by exposing sensitive user data but does not affect data integrity or system availability. The CVSS 3.1 base score is 2.7, reflecting a low severity due to the requirement for authenticated access with elevated privileges and the limited scope of data exposure. No public exploits have been reported, and no patches were linked at the time of publication. The issue highlights the importance of strict enforcement of attribute-level access controls within identity and access management platforms like Keycloak.
Potential Impact
The primary impact of CVE-2026-3911 is the unauthorized disclosure of sensitive user attributes that were configured to be hidden, potentially exposing private personal information. For organizations, this could lead to privacy violations, regulatory compliance issues (such as GDPR or CCPA), and erosion of user trust. Although the vulnerability requires authenticated access with the view-users role, insider threats or compromised accounts with this role could exploit the flaw. The exposure is limited to confidentiality and does not affect system integrity or availability, reducing the overall risk. However, in environments where Keycloak is used as a central identity provider for critical applications, even limited data leakage could facilitate further targeted attacks or social engineering. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
Organizations should immediately audit and restrict the assignment of the view-users role to only trusted administrators to minimize exposure. Monitoring and logging access to administrative endpoints should be enhanced to detect suspicious activity. Since no patch links were provided at the time of disclosure, organizations should stay alert for official updates or patches from Red Hat and apply them promptly once available. As a proactive measure, consider implementing additional attribute-level access controls or custom filters within Keycloak to enforce stricter data visibility policies. Regularly review and update Keycloak configurations to ensure that sensitive attributes are not unnecessarily exposed. Employ multi-factor authentication for administrative accounts to reduce the risk of credential compromise. Finally, conduct periodic security assessments and penetration tests focusing on identity management components to identify similar weaknesses.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2026-03-11T03:32:12.979Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b104d42f860ef943326c64
Added to database: 3/11/2026, 5:59:48 AM
Last enriched: 4/3/2026, 3:21:31 AM
Last updated: 4/28/2026, 7:28:59 AM
Views: 182
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.