Description
A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAML) broker endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exploit this by crafting a malicious SAML response. This allows the attacker to inject an encrypted assertion for an arbitrary principal, leading to unauthorized access and potential information disclosure.
Problem types
Improper Validation of Specified Type of Input
Product status
26.2.14-1 (rpm) before *
26.2-16 (rpm) before *
26.2-16 (rpm) before *
26.4.10-1 (rpm) before *
26.4-12 (rpm) before *
26.4-12 (rpm) before *
Timeline
| 2026-02-06: | Reported to Red Hat. |
| 2026-03-05: | Made public. |
Credits
Red Hat would like to thank Oleh Konko for reporting this issue.
References
access.redhat.com/errata/RHSA-2026:3925 (RHSA-2026:3925)
access.redhat.com/errata/RHSA-2026:3926 (RHSA-2026:3926)
access.redhat.com/errata/RHSA-2026:3947 (RHSA-2026:3947)
access.redhat.com/errata/RHSA-2026:3948 (RHSA-2026:3948)
access.redhat.com/security/cve/CVE-2026-2092
bugzilla.redhat.com/show_bug.cgi?id=2437296 (RHBZ#2437296)