Ad

CVE-2026-4634

HIGH CVSS 3.1: 7.5 EPSS 0.07%
Updated Apr 16, 2026
Red Hat
Parameter Value
CVSS 7.5 (HIGH)
Type CWE-1050
Vendor Red Hat
Public PoC No

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
None
No data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 5

Configuration From (including) Up to (excluding)
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.2:*:*:*:text-only:*:*:*
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.2.15:*:*:*:text-only:*:*:*
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.4:*:*:*:text-only:*:*:*
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.4.11:*:*:*:text-only:*:*:*