Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4636: Incorrect Behavior Order: Authorization Before Parsing and Canonicalization in Red Hat Red Hat build of Keycloak 26.2

0
High
VulnerabilityCVE-2026-4636cvecve-2026-4636
Published: Thu Apr 02 2026 (04/02/2026, 12:45:01 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.2

Description

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 13:23:21 UTC

Technical Analysis

CVE-2026-4636 affects the Red Hat Build of Keycloak, an open-source identity and access management solution widely used for single sign-on and authorization services. The vulnerability stems from an incorrect sequence in the authorization process, where authorization checks occur before the parsing and canonicalization of resource identifiers during UMA policy validation. Specifically, an authenticated user possessing the uma_protection role can craft a policy creation request that includes resource identifiers owned by other users. Due to the flawed validation logic, the system incorrectly authorizes these requests, allowing the attacker to associate unauthorized resources with their policies. This leads to the issuance of Requesting Party Tokens (RPTs) that grant access to victim-owned resources without proper permission. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network with low complexity. The CVSS v3.1 score of 8.1 reflects the high impact on confidentiality and integrity, as unauthorized access to sensitive data or privileged actions can be performed. The flaw compromises the core UMA authorization mechanism, undermining the trust boundaries Keycloak enforces between users and their resources. No patches or known exploits are currently reported, but the vulnerability demands urgent attention due to the critical nature of access control bypass in identity management systems.

Potential Impact

The impact of CVE-2026-4636 is significant for organizations relying on Red Hat Build of Keycloak for identity and access management, especially those implementing User-Managed Access (UMA) policies. Successful exploitation allows attackers with the uma_protection role to bypass critical authorization controls, granting unauthorized access to resources owned by other users. This can lead to exposure of sensitive information, unauthorized data modification, or execution of privileged actions, severely compromising confidentiality and integrity. Since Keycloak often protects enterprise applications, cloud services, and APIs, the breach can cascade into broader system compromises. The vulnerability does not affect availability directly but undermines trust in access control mechanisms, potentially leading to regulatory compliance violations and reputational damage. Organizations with multi-tenant environments or those managing sensitive user data are particularly at risk. The ease of exploitation combined with the high impact on core security functions makes this vulnerability a critical concern for global enterprises and service providers using Keycloak.

Mitigation Recommendations

To mitigate CVE-2026-4636, organizations should: 1) Monitor Red Hat and Keycloak official channels for patches or updates addressing this vulnerability and apply them promptly once released. 2) Review and audit UMA policy configurations to ensure that resource identifiers are strictly validated and that policies cannot reference unauthorized resources. 3) Implement additional access controls or compensating controls such as enhanced logging and anomaly detection to identify suspicious policy creation requests involving cross-user resource references. 4) Restrict the assignment of the uma_protection role to only trusted and necessary users, minimizing the attack surface. 5) Conduct thorough penetration testing and code reviews focusing on authorization logic and resource identifier handling in Keycloak deployments. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malformed or suspicious UMA policy requests until patches are available. 7) Educate administrators and developers about the risks of improper authorization sequencing and encourage secure coding practices around parsing and canonicalization. These targeted actions go beyond generic advice by focusing on the specific authorization bypass mechanism and role-based access controls involved in this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-03-23T08:51:40.787Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ce6a44e6bfc5ba1dd993b3

Added to database: 4/2/2026, 1:08:20 PM

Last enriched: 4/2/2026, 1:23:21 PM

Last updated: 4/3/2026, 6:58:53 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses