Description
A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker can craft requests to mask path segments, potentially bypassing proxy-level path filtering. This could expose administrative or sensitive endpoints that operators believe are not externally reachable.
Problem types
Product status
Timeline
| 2026-01-15: | Reported to Red Hat. |
| 2026-01-15: | Made public. |
Credits
Red Hat would like to thank Alexander Schwartz (RedHat) for reporting this issue.
References
access.redhat.com/security/cve/CVE-2026-0976
bugzilla.redhat.com/show_bug.cgi?id=2429869 (RHBZ#2429869)