Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-services
  4. ›
  5. CVE-2026-4633

CVE-2026-4633: Keycloak's identity-first login flow exposes user information

March 23, 2026 (updated April 13, 2026)

A flaw was found in Keycloak. A remote attacker can exploit differential error messages during the identity-first login flow when Organizations are enabled. This vulnerability allows an attacker to determine the existence of users, leading to information disclosure through user enumeration.

References

  • access.redhat.com/security/cve/CVE-2026-4633
  • bugzilla.redhat.com/show_bug.cgi?id=2450247
  • github.com/advisories/GHSA-rhgq-f8x5-j2jc
  • github.com/keycloak/keycloak
  • github.com/keycloak/keycloak/commit/b137016cc6dcfd9f59b2aa2e6d73af8b0ebf7c6e
  • github.com/keycloak/keycloak/commit/b4558a874fa79341404ae4d2d8f240f22bfed340
  • github.com/keycloak/keycloak/issues/47619
  • nvd.nist.gov/vuln/detail/CVE-2026-4633

Code Behaviors & Features

Detect and mitigate CVE-2026-4633 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 26.4.7, all versions starting from 26.5.0 before 26.6.0

Fixed versions

  • 26.6.0

Solution

Upgrade to version 26.6.0 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-209: Generation of Error Message Containing Sensitive Information

Source file

maven/org.keycloak/keycloak-services/CVE-2026-4633.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:44 +0000.