No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Tue, 19 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 19 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. A broken access control vulnerability in the Account Resources user lookup endpoint allows a remote authenticated user, who owns at least one User-Managed Access (UMA) resource, to enumerate and harvest personally identifiable information (PII) for all realm users. By sending crafted requests with arbitrary usernames or email values, the endpoint returns full profile objects for unrelated users. This leads to broad profile-level information disclosure. | |
| Title | Keycloak: org.keycloak.authorization: keycloak: information disclosure via broken access control in user lookup endpoint | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-1220 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-05-19T12:06:13.589Z
Reserved: 2026-04-06T07:48:39.722Z
Link: CVE-2026-37981
Updated: 2026-05-19T12:06:10.279Z
Status : Awaiting Analysis
Published: 2026-05-19T12:16:18.463
Modified: 2026-05-19T14:25:40.320
Link: CVE-2026-37981
OpenCVE Enrichment
Updated: 2026-05-19T13:00:06Z