CVE-2026-4366 PUBLISHED

Keycloak-services: blind server-side request forgery (ssrf) via http redirect handling in keycloak

Assigner: redhat
Reserved: 18.03.2026 Published: 18.03.2026 Updated: 18.03.2026

A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintended requests to internal or restricted resources. As a result, sensitive internal services such as cloud metadata endpoints could be accessed. This issue may lead to information disclosure and enable attackers to map internal network infrastructure.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
CVSS Score: 5.8

Product Status

Vendor Red Hat
Product Red Hat Build of Keycloak
Versions Default: affected
Vendor Red Hat
Product Red Hat Build of Keycloak
Versions Default: affected
Vendor Red Hat
Product Red Hat Build of Keycloak
Versions Default: affected
Vendor Red Hat
Product Red Hat JBoss Enterprise Application Platform 8
Versions Default: affected
Vendor Red Hat
Product Red Hat JBoss Enterprise Application Platform Expansion Pack
Versions Default: affected
Vendor Red Hat
Product Red Hat Single Sign-On 7
Versions Default: affected

Workarounds

To mitigate this vulnerability, restrict the outbound network access of the Keycloak instance. Configure firewall rules to prevent the Keycloak server from initiating connections to internal network segments, especially to well-known cloud metadata service IP addresses such as 169.254.169.254. For example, on Red Hat Enterprise Linux, you can use firewalld to add a rich rule: sudo firewall-cmd --permanent --zone=public --add-rich-rule='rule family="ipv4" destination address="169.254.169.254" reject' sudo firewall-cmd --reload This may impact other services if they legitimately rely on accessing these internal IPs. Additionally, ensure that any configured sector_identifier_uri values are thoroughly validated to only point to trusted, external URLs that do not perform redirects to internal resources.

Credits

  • Red Hat would like to thank Georgije Vukov (Elite Security Systems) for reporting this issue.

References

Problem Types

  • Server-Side Request Forgery (SSRF) CWE