CVE-2026-3009 PUBLISHED

Org.keycloak/keycloak-services: improper enforcement of disabled identity provider in identitybrokerservice (authentication bypass)

Assigner: redhat
Reserved: 23.02.2026 Published: 05.03.2026 Updated: 24.03.2026

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the administrative restriction. This undermines access control enforcement and may allow unauthorized authentication through a disabled external provider.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 8.1

Product Status

Vendor Red Hat
Product Red Hat build of Keycloak 26.4
Versions Default: affected
  • unaffected from 26.4.10-1 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.4
Versions Default: affected
  • unaffected from 26.4-12 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.4
Versions Default: affected
  • unaffected from 26.4-12 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.4.10
Versions Default: unaffected
Vendor Red Hat
Product Red Hat JBoss Enterprise Application Platform 8
Versions Default: unaffected
Vendor Red Hat
Product Red Hat JBoss Enterprise Application Platform Expansion Pack
Versions Default: unaffected
Vendor Red Hat
Product Red Hat Single Sign-On 7
Versions Default: unknown

Workarounds

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

References

Problem Types

  • Incorrect Authorization CWE