Количество 4
Количество 4
CVE-2026-4636
A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.
CVE-2026-4636
A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.
CVE-2026-4636
A flaw was found in Keycloak. An authenticated user with the uma_prote ...
GHSA-f2hx-5fx3-hmcv
Keycloak: UMA Policy Resource Injection Allows Unauthorized Cross-User Permission Grants
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-4636 A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions. | CVSS3: 8.1 | 0% Низкий | 7 дней назад | |
CVE-2026-4636 A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions. | CVSS3: 8.1 | 0% Низкий | 7 дней назад | |
CVE-2026-4636 A flaw was found in Keycloak. An authenticated user with the uma_prote ... | CVSS3: 8.1 | 0% Низкий | 7 дней назад | |
GHSA-f2hx-5fx3-hmcv Keycloak: UMA Policy Resource Injection Allows Unauthorized Cross-User Permission Grants | CVSS3: 8.1 | 0% Низкий | 7 дней назад |
Уязвимостей на страницу