CVE Vulnerabilities

CVE-2026-2575

Improper Handling of Highly Compressed Data (Data Amplification)

Published: Mar 18, 2026 | Modified: Mar 18, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in Keycloak. An unauthenticated remote attacker can trigger an application level Denial of Service (DoS) by sending a highly compressed SAMLRequest through the SAML Redirect Binding. The server fails to enforce size limits during DEFLATE decompression, leading to an OutOfMemoryError (OOM) and subsequent process termination. This vulnerability allows an attacker to disrupt the availability of the service.

Weakness

The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.

Affected Software

NameVendorStart VersionEnd Version
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-operator-bundle:26.4.10-1*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9:26.4-12*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9-operator:26.4-12*
Red Hat build of Keycloak 26.4.10RedHatrhbk/keycloak-rhel9*

References