Логотип exploitDog
bind:CVE-2026-3047
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-3047

Количество 4

Количество 4

redhat логотип

CVE-2026-3047

22 дня назад

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2026-3047

22 дня назад

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2026-3047

22 дня назад

A flaw was found in org.keycloak.broker.saml. When a disabled Security ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-8cr3-vpxx-92cx

22 дня назад

Keycloak SAML Broken has Authentication Bypass by Primary Weakness

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-3047

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.

CVSS3: 8.8
0%
Низкий
22 дня назад
nvd логотип
CVE-2026-3047

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.

CVSS3: 8.8
0%
Низкий
22 дня назад
debian логотип
CVE-2026-3047

A flaw was found in org.keycloak.broker.saml. When a disabled Security ...

CVSS3: 8.8
0%
Низкий
22 дня назад
github логотип
GHSA-8cr3-vpxx-92cx

Keycloak SAML Broken has Authentication Bypass by Primary Weakness

CVSS3: 8.8
0%
Низкий
22 дня назад

Уязвимостей на страницу