Описание
Keycloak affected by improper invitation token validation
A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2026-1529
- https://github.com/keycloak/keycloak/issues/46145
- https://github.com/keycloak/keycloak/pull/46155
- https://github.com/keycloak/keycloak/commit/8fc9a98026106a326f4faa98d4c9a48341ace2d7
- https://access.redhat.com/errata/RHSA-2026:2363
- https://access.redhat.com/errata/RHSA-2026:2364
- https://access.redhat.com/errata/RHSA-2026:2365
- https://access.redhat.com/errata/RHSA-2026:2366
- https://access.redhat.com/security/cve/CVE-2026-1529
- https://bugzilla.redhat.com/show_bug.cgi?id=2433783
Пакеты
org.keycloak:keycloak-services
< 26.5.3
26.5.3
Связанные уязвимости
A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.
A flaw was found in Keycloak. An attacker can exploit this vulnerabili ...