GHSA-R8JR-WG88-FQ5C
Vulnerability from github – Published: 2026-03-12 12:30 – Updated: 2026-03-12 17:38
VLAI?
Summary
Keycloak vulnerable to authorization bypass via the Admin API
Details
A flaw was found in Keycloak. An authorization bypass vulnerability in the Keycloak Admin API allows any authenticated user, even those without administrative privileges, to enumerate the organization memberships of other users. This information disclosure occurs if the attacker knows the victim's unique identifier (UUID) and the Organizations feature is enabled.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "@keycloak/keycloak-admin-client"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "26.5.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-js-admin-client"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "26.5.5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-2366"
],
"database_specific": {
"cwe_ids": [
"CWE-639"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-12T17:38:28Z",
"nvd_published_at": "2026-03-12T11:15:55Z",
"severity": "LOW"
},
"details": "A flaw was found in Keycloak. An authorization bypass vulnerability in the Keycloak Admin API allows any authenticated user, even those without administrative privileges, to enumerate the organization memberships of other users. This information disclosure occurs if the attacker knows the victim\u0027s unique identifier (UUID) and the Organizations feature is enabled.",
"id": "GHSA-r8jr-wg88-fq5c",
"modified": "2026-03-12T17:38:28Z",
"published": "2026-03-12T12:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2366"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/issues/47062"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2026-2366"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439081"
},
{
"type": "PACKAGE",
"url": "https://github.com/keycloak/keycloak"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Keycloak vulnerable to authorization bypass via the Admin API"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…