CVE-2026-7307 PUBLISHED

Keycloak: keycloak: denial of service via specially crafted saml input

Assigner: redhat
Reserved: 28.04.2026 Published: 19.05.2026 Updated: 19.05.2026

A flaw was found in Keycloak. A remote, unauthenticated attacker can send a specially crafted XML input to the Security Assertion Markup Language (SAML) endpoint. This malicious input can cause high CPU usage and worker thread starvation, leading to a Denial of Service (DoS) where the server becomes unavailable.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor Red Hat
Product Red Hat Build of Keycloak
Versions Default: unknown

Workarounds

To mitigate this vulnerability, restrict network access to the Keycloak SAML endpoint to trusted networks and clients. Implement firewall rules to limit inbound connections to the Keycloak service port (e.g., 8080) from untrusted sources. If the SAML protocol is not required for your deployment, consider disabling it to eliminate the attack surface. Applying these network restrictions or configuration changes may necessitate a restart or reload of the Keycloak service, which could temporarily affect its availability.

Credits

  • Red Hat would like to thank Anchels for reporting this issue.

References

Problem Types

  • Improper Validation of Syntactic Correctness of Input CWE