PT-2026-28224 · Red Hat · Red Hat Build Of Keycloak+3
Published
2026-03-26
·
Updated
2026-03-26
·
CVE-2026-4874
CVSS v3.1
3.1
Low
| AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the
client session host parameter during refresh token requests. This occurs when a Keycloak client is configured to use the backchannel.logout.url with the application.session.host placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Red Hat Build Of Keycloak
Red Hat Enterprise Application Platform 8
Red Hat Jboss Enterprise Application Platform Expansion Pack
Red Hat Single Sign-On 7