PT-2026-41833 · Red Hat · Red Hat Build Of Keycloak

Published

2026-05-19

·

Updated

2026-05-19

·

CVE-2026-8830

CVSS v3.1

4.3

Medium

VectorAV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
A flaw was found in Keycloak. An authenticated user can bypass configured WebAuthn policies during credential registration by manipulating client-side JavaScript. This occurs because the server-side processAction() fails to validate that the newly created credential's parameters, such as public key algorithms, match the realm's configured WebAuthn policies. This could lead to the creation of credentials that do not adhere to administrative security requirements, potentially weakening the overall security posture of the system by allowing non-compliant authentication methods.

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-8830

Affected Products

Red Hat Build Of Keycloak