CVE-2026-4636
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
02/04/2026
Última modificación:
16/04/2026
Descripción
*** Pendiente de traducción *** A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.
Impacto
Puntuación base 3.x
8.10
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:build_of_keycloak:26.2:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:build_of_keycloak:26.2.15:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:build_of_keycloak:26.4:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:build_of_keycloak:26.4.11:*:*:*:text-only:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



