CVE Vulnerabilities

CVE-2026-1529

Improper Verification of Cryptographic Signature

Published: Feb 09, 2026 | Modified: Feb 10, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
8.1 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation tokens JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-operator-bundle:26.2.13-1*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9:26.2-15*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9-operator:26.2-15*
Red Hat build of Keycloak 26.2.13RedHatrhbk/keycloak-rhel9*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-operator-bundle:26.4.9-1*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9:26.4-11*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9-operator:26.4-10*
Red Hat build of Keycloak 26.4.9RedHatrhbk/keycloak-rhel9*

References