CVE-2026-7500 PUBLISHED

Org.keycloak.keycloak-services: improper access control on keycloak server when the account account api feature is disabled

Assigner: redhat
Reserved: 30.04.2026 Published: 30.04.2026 Updated: 30.04.2026

When Keycloak is started with --features-disabled=account,account-api, the Account REST API is only partially disabled. Five endpoints under the versioned path /account/v1alpha1 remain fully functional — including both read and write operations — because they lack the checkAccountApiEnabled() gate that correctly blocks four other endpoints in the same REST service class. The user needs to have permissions to use the API.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS Score: 5.4

Product Status

Vendor Red Hat
Product Red Hat Build of Keycloak
Versions Default: affected

Workarounds

To reduce the attack surface, restrict network access to the Keycloak server's administration and API endpoints to trusted networks or hosts. This limits the ability of unauthorized users to interact with the server and potentially exploit this improper access control vulnerability. If the Keycloak service is reloaded or restarted, ensure that firewall rules or network access controls remain in effect.

Credits

  • Red Hat would like to thank Evan Hendra for reporting this issue.

References

Problem Types

  • Direct Request ('Forced Browsing') CWE