Impact
A flaw in Keycloak allows an attacker who controls another web path on the same server to bypass redirect URI validation that uses wildcards, enabling the attacker to retrieve an access token and disclose sensitive information. This bypass aligns with the improper authorization weakness identified as CWE-601.
Affected Systems
The vulnerability affects Red Hat build of Keycloak versions 26.2 and 26.4, including the 26.2.15 and 26.4.11 patch levels. Services running any of these Red Hat Keycloak builds are potentially exposed.
Risk and Exploitability
The flaw carries a CVSS score of 7.3, indicating high severity, while EPSS information is not available and it is not listed in the CISA KEV catalog. An attacker must control an alternate path on the same web server and supply a redirect URI containing a wildcard to exploit the logic flaw. The risk is moderate to high, with a realistic chance of successful exploitation in environments where wildcard redirect URIs are configured.
OpenCVE Enrichment
Github GHSA