A flaw was found in Keycloak. A remote attacker can exploit differential error messages during the identity-first login flow when Organizations are enabled. This vulnerability allows an attacker to determine the existence of users, leading to information disclosure through user enumeration.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-4633 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2450247 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
01 Apr 2026, 14:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:-:*:*:* | |
| First Time |
Redhat
Redhat build Of Keycloak |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-4633 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2450247 - Exploit, Issue Tracking, Vendor Advisory |
23 Mar 2026, 11:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 11:16
Updated : 2026-04-01 14:26
NVD link : CVE-2026-4633
Mitre link : CVE-2026-4633
CVE.ORG link : CVE-2026-4633
JSON object : View
Products Affected
redhat
- build_of_keycloak
CWE
CWE-209
Generation of Error Message Containing Sensitive Information
