Description
A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to complete broker logins even when the SAML Identity Provider is disabled, leading to unauthorized authentication.
Published: 2026-03-18
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Authentication
Action: Immediate Patch
AI Analysis

Impact

The flaw in Keycloak allows a remote attacker to supply a valid SAML response to the SAML endpoint for IdP-initiated broker logins. Even when the target Identity Provider is marked as disabled, the attacker can complete a broker login, effectively authenticating without authorization. This results in the attacker gaining access to resources and user accounts that should remain protected.

Affected Systems

Red Hat builds of Keycloak 26.2 (including 26.2.14) and 26.4 (including 26.4.10) running on Red Hat Enterprise Linux 9 are affected by this vulnerability.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity. The EPSS score is less than 1 %, meaning real-world exploitation likelihood is low, and the vulnerability is not listed in CISA’s KEV catalog. However, the attack requires the attacker to reach the Keycloak SAML endpoint and craft a valid SAML response, so systems exposed to the network that can accept SAML traffic are the most susceptible. No known public exploitation has been reported, but the impact is significant if exploited.

Generated by OpenCVE AI on April 16, 2026 at 02:43 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


OpenCVE Recommended Actions

  • Apply the Red Hat update associated with errata RHSA-2026:3925 and RHSA-2026:3926 to patch Keycloak to a fixed version.
  • Verify that the SAML identity provider is truly disabled or otherwise block access to the SAML broker endpoint using firewall rules or network segmentation.
  • Enable logging of broker login attempts and periodically review logs for anomalous SAML responses that could indicate attempted bypass.

Generated by OpenCVE AI on April 16, 2026 at 02:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x4p7-7chp-64hq Keycloak: Unauthorized authentication via disabled SAML Identity Provider
History

Wed, 18 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 01:30:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to complete broker logins even when the SAML Identity Provider is disabled, leading to unauthorized authentication.
Title keycloak: Keycloak: Unauthorized authentication via disabled SAML Identity Provider Keycloak: keycloak: unauthorized authentication via disabled saml identity provider
Weaknesses CWE-306
References

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Keycloak
Keycloak keycloak
Vendors & Products Keycloak
Keycloak keycloak

Fri, 06 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title keycloak: Keycloak: Unauthorized authentication via disabled SAML Identity Provider
First Time appeared Redhat
Redhat build Keycloak
CPEs cpe:/a:redhat:build_keycloak:26.2::el9
cpe:/a:redhat:build_keycloak:26.4::el9
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

threat_severity

Important


Subscriptions

Keycloak Keycloak
Redhat Build Keycloak
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-18T14:10:10.355Z

Reserved: 2026-02-16T21:18:50.125Z

Link: CVE-2026-2603

cve-icon Vulnrichment

Updated: 2026-03-18T14:09:58.436Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-18T02:16:24.813

Modified: 2026-03-18T15:16:30.500

Link: CVE-2026-2603

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-05T11:23:00Z

Links: CVE-2026-2603 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:45:06Z

Weaknesses