Логотип exploitDog
bind:CVE-2026-4636
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-4636

Количество 4

Количество 4

redhat логотип

CVE-2026-4636

7 дней назад

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2026-4636

7 дней назад

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2026-4636

7 дней назад

A flaw was found in Keycloak. An authenticated user with the uma_prote ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-f2hx-5fx3-hmcv

7 дней назад

Keycloak: UMA Policy Resource Injection Allows Unauthorized Cross-User Permission Grants

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-4636

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.

CVSS3: 8.1
0%
Низкий
7 дней назад
nvd логотип
CVE-2026-4636

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.

CVSS3: 8.1
0%
Низкий
7 дней назад
debian логотип
CVE-2026-4636

A flaw was found in Keycloak. An authenticated user with the uma_prote ...

CVSS3: 8.1
0%
Низкий
7 дней назад
github логотип
GHSA-f2hx-5fx3-hmcv

Keycloak: UMA Policy Resource Injection Allows Unauthorized Cross-User Permission Grants

CVSS3: 8.1
0%
Низкий
7 дней назад

Уязвимостей на страницу