A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-4874 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2451611 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Apr 2026, 14:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2026-4874 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2451611 - Issue Tracking, Vendor Advisory | |
| CPE | cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:-:*:*:* cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_enterprise_application_platform_expansion_pack:-:*:*:*:*:*:*:* |
|
| First Time |
Redhat
Redhat jboss Enterprise Application Platform Redhat single Sign-on Redhat jboss Enterprise Application Platform Expansion Pack Redhat build Of Keycloak |
|
| Summary |
|
26 Mar 2026, 08:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 08:16
Updated : 2026-04-01 14:11
NVD link : CVE-2026-4874
Mitre link : CVE-2026-4874
CVE.ORG link : CVE-2026-4874
JSON object : View
Products Affected
redhat
- single_sign-on
- jboss_enterprise_application_platform_expansion_pack
- jboss_enterprise_application_platform
- build_of_keycloak
CWE
CWE-918
Server-Side Request Forgery (SSRF)
