CVE Vulnerabilities

CVE-2026-3047

Authentication Bypass by Primary Weakness

Published: Mar 05, 2026 | Modified: Mar 05, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
8.8 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.

Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Affected Software

NameVendorStart VersionEnd Version
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-operator-bundle:26.2.14-1*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9:26.2-16*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9-operator:26.2-16*
Red Hat build of Keycloak 26.2.14RedHatrhbk/keycloak-rhel9*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-operator-bundle:26.4.10-1*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9:26.4-12*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9-operator:26.4-12*
Red Hat build of Keycloak 26.4.10RedHatrhbk/keycloak-rhel9*

References