CVE-2026-4633

A flaw was found in Keycloak. A remote attacker can exploit differential error messages during the identity-first login flow when Organizations are enabled. This vulnerability allows an attacker to determine the existence of users, leading to information disclosure through user enumeration.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2026-4633 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2450247 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:-:*:*:*

History

01 Apr 2026, 14:26

Type Values Removed Values Added
Summary
  • (es) Se encontró una falla en Keycloak. Un atacante remoto puede explotar mensajes de error diferenciales durante el flujo de inicio de sesión 'identity-first' cuando las Organizaciones están habilitadas. Esta vulnerabilidad permite a un atacante determinar la existencia de usuarios, lo que lleva a la revelación de información a través de la enumeración de usuarios.
CPE cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:-:*:*:*
First Time Redhat
Redhat build Of Keycloak
References () https://access.redhat.com/security/cve/CVE-2026-4633 - () https://access.redhat.com/security/cve/CVE-2026-4633 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2450247 - () https://bugzilla.redhat.com/show_bug.cgi?id=2450247 - Exploit, Issue Tracking, Vendor Advisory

23 Mar 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-23 11:16

Updated : 2026-04-01 14:26


NVD link : CVE-2026-4633

Mitre link : CVE-2026-4633

CVE.ORG link : CVE-2026-4633


JSON object : View

Products Affected

redhat

  • build_of_keycloak
CWE
CWE-209

Generation of Error Message Containing Sensitive Information