PT-2026-26027 · Red Hat · Red Hat Build Of Keycloak 26.4+1
Published
2026-03-18
·
Updated
2026-03-18
·
CVE-2026-2575
CVSS v3.1
5.3
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
A flaw was found in Keycloak. An unauthenticated remote attacker can trigger an application level Denial of Service (DoS) by sending a highly compressed SAMLRequest through the SAML Redirect Binding. The server fails to enforce size limits during DEFLATE decompression, leading to an OutOfMemoryError (OOM) and subsequent process termination. This vulnerability allows an attacker to disrupt the availability of the service.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Red Hat Build Of Keycloak 26.4
Red Hat Build Of Keycloak 26.4.10