Описание
Keycloak affected by improper invitation token validation
A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2026-1529
- https://github.com/keycloak/keycloak/issues/46145
- https://github.com/keycloak/keycloak/pull/46155
- https://github.com/keycloak/keycloak/commit/82cd7941d1dd28fa14a67a6e6b912301f1a5e1a1
- https://github.com/keycloak/keycloak/commit/8fc9a98026106a326f4faa98d4c9a48341ace2d7
- https://github.com/keycloak/keycloak/commit/b2519756487b519f95c07aa8b10afe003e492119
- https://access.redhat.com/errata/RHSA-2026:2363
- https://access.redhat.com/errata/RHSA-2026:2364
- https://access.redhat.com/errata/RHSA-2026:2365
- https://access.redhat.com/errata/RHSA-2026:2366
- https://access.redhat.com/security/cve/CVE-2026-1529
- https://bugzilla.redhat.com/show_bug.cgi?id=2433783
Пакеты
org.keycloak:keycloak-services
>= 26.5.0, < 26.5.3
26.5.3
org.keycloak:keycloak-services
< 26.2.13
26.2.13
org.keycloak:keycloak-services
>= 26.3.0, < 26.4.9
26.4.9
Связанные уязвимости
A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.
A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.
A flaw was found in Keycloak. An attacker can exploit this vulnerabili ...
Уязвимость компонента JSON Web Token Handler программного средства для управления идентификацией и доступом Keycloak, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации