PT-2026-28224 · Red Hat · Red Hat Build Of Keycloak+3

Published

2026-03-26

·

Updated

2026-03-26

·

CVE-2026-4874

CVSS v3.1

3.1

Low

AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the client session host parameter during refresh token requests. This occurs when a Keycloak client is configured to use the backchannel.logout.url with the application.session.host placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.

Fix

SSRF

Weakness Enumeration

Related Identifiers

CVE-2026-4874

Affected Products

Red Hat Build Of Keycloak
Red Hat Enterprise Application Platform 8
Red Hat Jboss Enterprise Application Platform Expansion Pack
Red Hat Single Sign-On 7