CVE-2026-4634
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/04/2026
Last modified:
16/04/2026
Description
A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:build_of_keycloak:26.2:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:build_of_keycloak:26.2.15:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:build_of_keycloak:26.4:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:build_of_keycloak:26.4.11:*:*:*:text-only:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



