CVE-2026-4282: Improper Isolation or Compartmentalization in Red Hat Red Hat build of Keycloak 26.2
A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an unauthenticated attacker to forge authorization codes. Successful exploitation can lead to the creation of admin-capable access tokens, resulting in privilege escalation.
AI Analysis
Technical Summary
The vulnerability CVE-2026-4282 affects Red Hat build of Keycloak version 26.2. The issue stems from improper isolation or compartmentalization in the SingleUseObjectProvider, which is a global key-value store used by Keycloak. Due to the lack of proper type and namespace isolation, an unauthenticated attacker can exploit this flaw to forge authorization codes. Successful exploitation can result in the generation of access tokens with administrative privileges, leading to privilege escalation within the system. Red Hat has acknowledged this vulnerability and included a fix in the Keycloak 26.2.15 update. The vulnerability is rated with a CVSS v3.1 score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), reflecting network attack vector, high complexity, no privileges or user interaction required, unchanged scope, and high confidentiality and integrity impact without availability impact.
Potential Impact
An unauthenticated attacker can exploit this vulnerability to forge authorization codes, which may lead to the creation of admin-capable access tokens. This results in privilege escalation, allowing the attacker to gain administrative access to the Keycloak authentication server. The impact includes high confidentiality and integrity compromise but does not affect availability. There are no known exploits in the wild at the time of this advisory.
Mitigation Recommendations
Red Hat has released updated packages for Red Hat build of Keycloak version 26.2.15 that address this vulnerability along with other security issues. Users should back up their existing installations, including applications, configuration files, and databases, before applying the update. Applying the official update from Red Hat is the recommended remediation. No alternative mitigations or workarounds are specified in the advisory. Patch status is confirmed by the vendor advisory, and the fix is available.
CVE-2026-4282: Improper Isolation or Compartmentalization in Red Hat Red Hat build of Keycloak 26.2
Description
A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an unauthenticated attacker to forge authorization codes. Successful exploitation can lead to the creation of admin-capable access tokens, resulting in privilege escalation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-4282 affects Red Hat build of Keycloak version 26.2. The issue stems from improper isolation or compartmentalization in the SingleUseObjectProvider, which is a global key-value store used by Keycloak. Due to the lack of proper type and namespace isolation, an unauthenticated attacker can exploit this flaw to forge authorization codes. Successful exploitation can result in the generation of access tokens with administrative privileges, leading to privilege escalation within the system. Red Hat has acknowledged this vulnerability and included a fix in the Keycloak 26.2.15 update. The vulnerability is rated with a CVSS v3.1 score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), reflecting network attack vector, high complexity, no privileges or user interaction required, unchanged scope, and high confidentiality and integrity impact without availability impact.
Potential Impact
An unauthenticated attacker can exploit this vulnerability to forge authorization codes, which may lead to the creation of admin-capable access tokens. This results in privilege escalation, allowing the attacker to gain administrative access to the Keycloak authentication server. The impact includes high confidentiality and integrity compromise but does not affect availability. There are no known exploits in the wild at the time of this advisory.
Mitigation Recommendations
Red Hat has released updated packages for Red Hat build of Keycloak version 26.2.15 that address this vulnerability along with other security issues. Users should back up their existing installations, including applications, configuration files, and databases, before applying the update. Applying the official update from Red Hat is the recommended remediation. No alternative mitigations or workarounds are specified in the advisory. Patch status is confirmed by the vendor advisory, and the fix is available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2026-03-16T15:53:24.993Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ce6a44e6bfc5ba1dd993a7
Added to database: 4/2/2026, 1:08:20 PM
Last enriched: 4/9/2026, 10:30:38 PM
Last updated: 5/20/2026, 8:51:18 PM
Views: 181
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.