Skip to content

Commit 5b4ac8e

Browse files
1 parent ad54d69 commit 5b4ac8e

2 files changed

Lines changed: 82 additions & 8 deletions

File tree

advisories/unreviewed/2026/02/GHSA-37gf-gmxv-74wv/GHSA-37gf-gmxv-74wv.json renamed to advisories/github-reviewed/2026/02/GHSA-37gf-gmxv-74wv/GHSA-37gf-gmxv-74wv.json

Lines changed: 41 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,57 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-37gf-gmxv-74wv",
4-
"modified": "2026-02-10T03:30:27Z",
4+
"modified": "2026-02-10T18:35:15Z",
55
"published": "2026-02-09T21:31:03Z",
66
"aliases": [
77
"CVE-2026-1486"
88
],
9+
"summary": "Keycloak fails to verify if an Identity Provider (IdP) is enabled before issuing tokens",
910
"details": "A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer) retrieves the IdP configuration but does not filter for isEnabled=false. If an administrator disables an IdP (e.g., due to a compromise or offboarding), an entity possessing that IdP's signing key can still generate valid JWT assertions that Keycloak accepts, resulting in the issuance of valid access tokens.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.5.3"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1486"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/46146"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/keycloak/keycloak/pull/46148"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/keycloak/keycloak/commit/176dc8902ce552056d3648c4601d519afc6fb043"
54+
},
2255
{
2356
"type": "WEB",
2457
"url": "https://access.redhat.com/errata/RHSA-2026:2365"
@@ -34,15 +67,19 @@
3467
{
3568
"type": "WEB",
3669
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433347"
70+
},
71+
{
72+
"type": "PACKAGE",
73+
"url": "https://github.com/keycloak/keycloak"
3774
}
3875
],
3976
"database_specific": {
4077
"cwe_ids": [
4178
"CWE-358"
4279
],
4380
"severity": "HIGH",
44-
"github_reviewed": false,
45-
"github_reviewed_at": null,
81+
"github_reviewed": true,
82+
"github_reviewed_at": "2026-02-10T18:35:15Z",
4683
"nvd_published_at": "2026-02-09T20:15:55Z"
4784
}
4885
}

advisories/unreviewed/2026/02/GHSA-hcvw-475w-8g7p/GHSA-hcvw-475w-8g7p.json renamed to advisories/github-reviewed/2026/02/GHSA-hcvw-475w-8g7p/GHSA-hcvw-475w-8g7p.json

Lines changed: 41 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,57 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hcvw-475w-8g7p",
4-
"modified": "2026-02-10T03:30:27Z",
4+
"modified": "2026-02-10T18:35:20Z",
55
"published": "2026-02-09T21:31:03Z",
66
"aliases": [
77
"CVE-2026-1529"
88
],
9+
"summary": "Keycloak affected by improper invitation token validation",
910
"details": "A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.5.3"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1529"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/46145"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/keycloak/keycloak/pull/46155"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/keycloak/keycloak/commit/8fc9a98026106a326f4faa98d4c9a48341ace2d7"
54+
},
2255
{
2356
"type": "WEB",
2457
"url": "https://access.redhat.com/errata/RHSA-2026:2363"
@@ -42,15 +75,19 @@
4275
{
4376
"type": "WEB",
4477
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433783"
78+
},
79+
{
80+
"type": "PACKAGE",
81+
"url": "https://github.com/keycloak/keycloak"
4582
}
4683
],
4784
"database_specific": {
4885
"cwe_ids": [
4986
"CWE-347"
5087
],
5188
"severity": "HIGH",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
89+
"github_reviewed": true,
90+
"github_reviewed_at": "2026-02-10T18:35:20Z",
5491
"nvd_published_at": "2026-02-09T20:15:55Z"
5592
}
5693
}

0 commit comments

Comments
 (0)