CVE-2026-0871: Keycloak Server Private SPI: Improper Access Control Allows Administrators to Bypass Attribute Visibility Restrictions and Modify Unmanaged User Profile Attributes
(updated )
A flaw was found in Keycloak. An administrator with manage-users permission can bypass the “Only administrators can view” setting for unmanaged attributes, allowing them to modify these attributes. This improper access control can lead to unauthorized changes to user profiles, even when the system is configured to restrict such modifications.
References
- access.redhat.com/errata/RHSA-2026:2365
- access.redhat.com/errata/RHSA-2026:2366
- access.redhat.com/security/cve/CVE-2026-0871
- bugzilla.redhat.com/show_bug.cgi?id=2428881
- github.com/advisories/GHSA-v4jw-m6rm-399h
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/commit/9d0f679ecea405958f167fcd0f4a6db6ae32c3fa
- github.com/keycloak/keycloak/issues/45873
- nvd.nist.gov/vuln/detail/CVE-2026-0871
Code Behaviors & Features
Detect and mitigate CVE-2026-0871 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →