Impact
A flaw in the SAML broker component of Keycloak allows a disabled SAML client that is configured as an IdP‑initiated broker landing target to complete the authentication flow, resulting in the creation of a valid Single Sign‑On session. The flaw permits a remote attacker to bypass the usual authentication checks, thereby gaining unauthorized access to any enabled clients associated with the same realm without re‑authentication. This represents an authentication bypass (CWE‑305) that can compromise confidentiality and integrity of protected resources.
Affected Systems
Red Hat builds of Keycloak are affected, including versions 26.2, 26.2.14, 26.4, and 26.4.10. Users deploying these releases should verify whether they have disabled SAML clients that are still referenced as broker landing targets in their realm configuration.
Risk and Exploitability
The vulnerability carries a CVSS 8.8 score, indicating high severity, but the EPSS score is below 1 %, suggesting a low probability of exploitation. It is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely by leveraging the IdP‑initiated SAML flow; the condition requires a disabled client to be incorrectly mapped as a broker landing target, a configuration mistake that provides an opportunity to gain unauthorized SSO access.
OpenCVE Enrichment
Github GHSA