Ad

CVE-2026-4636

HIGH CVSS 3.1: 8.1 EPSS 0.03%
Updated Apr 16, 2026
Red Hat
Parameter Value
CVSS 8.1 (HIGH)
Type CWE-551
Vendor Red Hat
Public PoC No

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource.

Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 5

Configuration From (including) Up to (excluding)
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.2:*:*:*:text-only:*:*:*
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.2.15:*:*:*:text-only:*:*:*
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.4:*:*:*:text-only:*:*:*
Redhat Build_Of_Keycloak
cpe:2.3:a:redhat:build_of_keycloak:26.4.11:*:*:*:text-only:*:*:*