No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Tue, 19 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. An authenticated client could exploit an Insecure Direct Object Reference (IDOR) vulnerability in the Authorization Services Protection API endpoint. By knowing or obtaining a resource's unique identifier (UUID) belonging to another Resource Server within the same realm, the client could bypass authorization checks. This allows the client to perform unauthorized GET, PUT, and DELETE operations on resources, leading to information disclosure and potential unauthorized modification or deletion of data. | |
| Title | Keycloak: keycloak: unauthorized resource access and data modification via insecure direct object reference | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-05-19T10:28:15.936Z
Reserved: 2026-03-23T08:12:45.479Z
Link: CVE-2026-4630
No data.
Status : Awaiting Analysis
Published: 2026-05-19T12:16:19.290
Modified: 2026-05-19T14:25:40.320
Link: CVE-2026-4630
No data.
OpenCVE Enrichment
Updated: 2026-05-19T12:30:05Z