Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-services
  4. ›
  5. CVE-2026-4874

CVE-2026-4874: Keycloak Server-Side Request Forgery via OIDC token endpoint manipulation

March 26, 2026 (updated April 13, 2026)

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the client_session_host parameter during refresh token requests. This occurs when a Keycloak client is configured to use the backchannel.logout.url with the application.session.host placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.

References

  • access.redhat.com/security/cve/CVE-2026-4874
  • bugzilla.redhat.com/show_bug.cgi?id=2451611
  • github.com/advisories/GHSA-22rm-wp4x-v5cx
  • github.com/keycloak/keycloak
  • nvd.nist.gov/vuln/detail/CVE-2026-4874

Code Behaviors & Features

Detect and mitigate CVE-2026-4874 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 26.6.0

Solution

Unfortunately, there is no solution available yet.

Impact 3.1 LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

maven/org.keycloak/keycloak-services/CVE-2026-4874.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:25 +0000.