Impact
Keycloak's SAML broker endpoint fails to validate encrypted assertions when the overall SAML response is not signed. An attacker who already possesses a signed SAML assertion can forge a SAML response that includes a maliciously encrypted assertion for an arbitrary user. This allows the attacker to impersonate that user and access resources or data for which the user has privileges, potentially revealing sensitive information.
Affected Systems
The flaw affects Red Hat build of Keycloak versions 26.2, 26.2.14, 26.4, and 26.4.10. Customers using these builds on Red Hat Enterprise Linux 9 are at risk.
Risk and Exploitability
With a CVSS score of 7.7 and an EPSS of less than 1 %, the vulnerability is considered high severity but unlikely to be widely exploited at present. The CVE is not listed in the CISA KEV catalog. The exploit requires network access to the SAML broker endpoint and the ability to craft a signed but malformed SAML response, making the attack vector remote and feasible against publicly exposed Keycloak instances.
OpenCVE Enrichment
Github GHSA