Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4366: Server-Side Request Forgery (SSRF) in Red Hat Red Hat Build of Keycloak

0
Medium
VulnerabilityCVE-2026-4366cvecve-2026-4366
Published: Wed Mar 18 2026 (03/18/2026, 04:02:59 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintended requests to internal or restricted resources. As a result, sensitive internal services such as cloud metadata endpoints could be accessed. This issue may lead to information disclosure and enable attackers to map internal network infrastructure.

AI-Powered Analysis

AILast updated: 03/18/2026, 18:15:45 UTC

Technical Analysis

CVE-2026-4366 is a medium-severity Server-Side Request Forgery (SSRF) vulnerability identified in the Red Hat Build of Keycloak, a widely used open-source identity and access management platform. The vulnerability stems from Keycloak's improper handling of HTTP redirects when processing certain client configuration requests. Specifically, when Keycloak follows these redirects without sufficient validation, an attacker can manipulate the server into issuing HTTP requests to internal or otherwise restricted network resources that are not directly accessible externally. This behavior can be exploited to access sensitive internal endpoints, such as cloud provider metadata services (e.g., AWS EC2 metadata, Azure Instance Metadata Service), which often contain credentials or configuration data. By leveraging this SSRF flaw, attackers can gather information about internal network topology, potentially facilitating further attacks or lateral movement within the network. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 5.8 reflects a network attack vector with low complexity, no privileges required, no user interaction, and a scope change due to information disclosure. Although no public exploits are known at this time, the widespread use of Keycloak in enterprise environments makes this a significant concern. The lack of patch links indicates that fixes may still be pending or in progress, emphasizing the need for interim mitigations.

Potential Impact

The primary impact of CVE-2026-4366 is unauthorized information disclosure. Attackers exploiting this SSRF vulnerability can access internal services that are normally shielded from external access, including cloud metadata endpoints that may contain sensitive credentials or configuration data. This exposure can lead to compromise of cloud accounts, escalation of privileges, or further network reconnaissance. Additionally, by mapping internal network infrastructure, attackers can identify critical systems and plan more targeted attacks. While the vulnerability does not directly allow code execution or denial of service, the information gained can significantly weaken an organization's security posture. Enterprises relying on Keycloak for identity management, especially those deployed in cloud or hybrid environments, face increased risk of data leakage and subsequent attacks. The vulnerability's ease of exploitation without authentication or user interaction broadens the attack surface, potentially affecting any externally accessible Keycloak instance. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation.

Mitigation Recommendations

Organizations should monitor Red Hat and Keycloak vendor advisories closely and apply security patches promptly once they become available. In the interim, administrators should restrict Keycloak's outbound HTTP requests through network controls such as firewall rules or proxy configurations to prevent unauthorized access to internal or cloud metadata endpoints. Implementing strict allowlists for outbound connections from Keycloak servers can limit the SSRF attack surface. Additionally, review and harden Keycloak client configuration workflows to ensure that redirect URLs are validated and restricted to trusted domains only. Employ network segmentation to isolate Keycloak servers from sensitive internal resources and metadata services. Logging and monitoring of unusual outbound requests from Keycloak instances can help detect exploitation attempts early. Finally, consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-03-18T03:43:54.685Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69baebb5771bdb1749b8ee09

Added to database: 3/18/2026, 6:15:17 PM

Last enriched: 3/18/2026, 6:15:45 PM

Last updated: 3/18/2026, 8:29:49 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses