Changeflow GovPing Data Privacy & Cybersecurity Keycloak Vulnerabilities Allow Remote Authentic...
Priority review Notice Amended Final

Keycloak Vulnerabilities Allow Remote Authenticated Attacks

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 22nd, 2026
Detected March 23rd, 2026
Email

Summary

CERT-Bund has issued a security advisory for Keycloak, detailing vulnerabilities that allow remote authenticated attackers to bypass security measures and disclose information. The advisory highlights a CVSS base score of 5.8 and affects Keycloak versions used on Linux and UNIX operating systems.

What changed

CERT-Bund has issued a security advisory (WID-SEC-2026-0821) concerning multiple vulnerabilities in Keycloak, an open-source identity and access management solution. These vulnerabilities, rated with a CVSS base score of 5.8, allow remote authenticated attackers to bypass security controls and potentially disclose sensitive information. The advisory applies to Keycloak versions running on Linux and UNIX operating systems.

Organizations utilizing Keycloak for single sign-on should immediately assess their systems for the described vulnerabilities. While no specific mitigation is provided in this advisory, prompt patching or implementing compensating controls is recommended to prevent unauthorized access and information disclosure. The advisory notes a CVSS temporal score of 5.3, indicating the vulnerability's current exploitability.

What to do next

  1. Assess Keycloak systems for vulnerabilities described in WID-SEC-2026-0821
  2. Apply available patches or implement compensating security controls

Source document (simplified)

[WID-SEC-2026-0821] Keycloak: Mehrere Schwachstellen CVSS Base Score 5.8 (mittel) CVSS Temporal Score 5.3 (mittel) Remoteangriff ja Datum 22.03.2026 Stand 23.03.2026 Mitigation nein

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX

Produktbeschreibung

Keycloak ermöglicht Single Sign-On mit Identity and Access Management für moderne Anwendungen und Dienste.

Produkte

22.03.2026
- Open Source Keycloak

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Keycloak ausnutzen, um Sicherheitsvorkehrungen zu umgehen, und um Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 22nd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0821

Who this affects

Applies to
Employers Technology companies
Industry sector
5112 Software & Technology
Activity scope
Identity and Access Management
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Identity and Access Management Vulnerability Management

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.