CVE-2026-4874

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:-:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform_expansion_pack:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*

History

01 Apr 2026, 14:11

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2026-4874 - () https://access.redhat.com/security/cve/CVE-2026-4874 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2451611 - () https://bugzilla.redhat.com/show_bug.cgi?id=2451611 - Issue Tracking, Vendor Advisory
CPE cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:-:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform_expansion_pack:-:*:*:*:*:*:*:*
First Time Redhat
Redhat jboss Enterprise Application Platform
Redhat single Sign-on
Redhat jboss Enterprise Application Platform Expansion Pack
Redhat build Of Keycloak
Summary
  • (es) Se encontró una vulnerabilidad en Keycloak. Un atacante autenticado puede realizar falsificación de petición del lado del servidor (SSRF) manipulando el parámetro 'client_session_host' durante las peticiones de token de actualización. Esto ocurre cuando un cliente de Keycloak está configurado para usar la 'backchannel.logout.url' con el marcador de posición 'application.session.host'. La explotación exitosa permite al atacante realizar peticiones HTTP desde el contexto de red del servidor de Keycloak, potencialmente sondeando redes internas o APIs internas, lo que lleva a la revelación de información.

26 Mar 2026, 08:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 08:16

Updated : 2026-04-01 14:11


NVD link : CVE-2026-4874

Mitre link : CVE-2026-4874

CVE.ORG link : CVE-2026-4874


JSON object : View

Products Affected

redhat

  • single_sign-on
  • jboss_enterprise_application_platform_expansion_pack
  • jboss_enterprise_application_platform
  • build_of_keycloak
CWE
CWE-918

Server-Side Request Forgery (SSRF)