Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4628: Improper Access Control in Red Hat Red Hat Build of Keycloak

0
Medium
VulnerabilityCVE-2026-4628cvecve-2026-4628
Published: Mon Mar 23 2026 (03/23/2026, 08:09:22 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

A flaw was found in Keycloak. An improper Access Control vulnerability in Keycloak’s User-Managed Access (UMA) resource_set endpoint allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false restriction. This occurs due to incomplete enforcement of access control checks on PUT operations to the resource_set endpoint. This issue enables unauthorized modification of protected resources, impacting data integrity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:23:55 UTC

Technical Analysis

CVE-2026-4628 identifies an improper access control vulnerability in the Red Hat Build of Keycloak, specifically within the User-Managed Access (UMA) protocol implementation. The flaw exists in the resource_set endpoint, which manages resource permissions. Normally, the allowRemoteResourceManagement=false setting is intended to restrict remote modification of resource sets. However, due to incomplete enforcement of access control checks on HTTP PUT requests to this endpoint, attackers possessing valid credentials can bypass this restriction. This enables them to modify protected resources without proper authorization, thereby compromising data integrity. The vulnerability does not expose confidential data or cause denial of service but allows unauthorized changes to resource definitions, potentially leading to privilege escalation or unauthorized access indirectly. Exploitation requires authentication but no additional user interaction, making it a risk primarily to insiders or compromised accounts. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) reflects network attack vector, low complexity, requiring privileges, no user interaction, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No patches or known exploits have been publicly disclosed as of the publication date, but the issue is classified as medium severity due to its potential to undermine resource management controls.

Potential Impact

The primary impact of CVE-2026-4628 is unauthorized modification of protected resources within Keycloak's UMA framework, which can lead to data integrity issues. Organizations relying on Keycloak for identity and access management may face risks of privilege escalation or unauthorized access if attackers manipulate resource permissions. This can undermine trust in access controls and potentially expose sensitive systems or data indirectly. Since exploitation requires valid credentials, the threat is heightened in environments where credential compromise or insider threats exist. The vulnerability does not directly affect confidentiality or availability, limiting the scope of damage, but the integrity impact can have cascading effects on security policies and enforcement. Enterprises using Red Hat Build of Keycloak in critical authentication or authorization roles should consider this a moderate risk that could facilitate further attacks if left unmitigated.

Mitigation Recommendations

To mitigate CVE-2026-4628, organizations should: 1) Apply any available patches or updates from Red Hat promptly once released. 2) Review and tighten access control policies around the UMA resource_set endpoint, ensuring that only trusted users have permission to modify resource sets. 3) Monitor logs for unusual PUT requests to the resource_set endpoint, especially from accounts with limited privileges. 4) Implement strong credential management and multi-factor authentication to reduce risk of credential compromise. 5) Consider temporarily disabling remote resource management features if not required. 6) Conduct regular audits of resource permissions and configurations within Keycloak to detect unauthorized changes early. 7) Educate administrators and developers on the importance of strict access control enforcement in identity management systems. These steps go beyond generic advice by focusing on the specific endpoint and feature affected, emphasizing proactive monitoring and configuration hardening.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-03-23T07:45:26.489Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c0fdbff4197a8e3b25d07d

Added to database: 3/23/2026, 8:45:51 AM

Last enriched: 3/30/2026, 8:23:55 PM

Last updated: 5/7/2026, 9:02:19 AM

Views: 164

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses