CVE-2026-3047

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:26.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:26.2.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:26.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:26.4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*

History

26 Mar 2026, 14:20

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en org.keycloak.broker.saml. Cuando un cliente de Security Assertion Markup Language (SAML) deshabilitado se configura como un objetivo de aterrizaje de intermediario iniciado por un Proveedor de Identidad (IdP), aún puede completar el proceso de inicio de sesión y establecer una sesión de Single Sign-On (SSO). Esto permite a un atacante remoto obtener acceso no autorizado a otros clientes habilitados sin re-autenticación, eludiendo eficazmente las restricciones de seguridad.
First Time Redhat
Redhat keycloak
Redhat build Of Keycloak
References () https://access.redhat.com/errata/RHSA-2026:3925 - () https://access.redhat.com/errata/RHSA-2026:3925 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2026:3926 - () https://access.redhat.com/errata/RHSA-2026:3926 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2026:3947 - () https://access.redhat.com/errata/RHSA-2026:3947 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2026:3948 - () https://access.redhat.com/errata/RHSA-2026:3948 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2026-3047 - () https://access.redhat.com/security/cve/CVE-2026-3047 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2441966 - () https://bugzilla.redhat.com/show_bug.cgi?id=2441966 - Issue Tracking, Vendor Advisory
CPE cpe:2.3:a:redhat:build_of_keycloak:26.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:26.4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:26.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:26.2.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*

05 Mar 2026, 20:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2026:3925 -
  • () https://access.redhat.com/errata/RHSA-2026:3926 -
  • () https://access.redhat.com/errata/RHSA-2026:3947 -
  • () https://access.redhat.com/errata/RHSA-2026:3948 -

05 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 19:16

Updated : 2026-03-26 14:20


NVD link : CVE-2026-3047

Mitre link : CVE-2026-3047

CVE.ORG link : CVE-2026-3047


JSON object : View

Products Affected

redhat

  • keycloak
  • build_of_keycloak
CWE
CWE-305

Authentication Bypass by Primary Weakness