Description
A flaw was found in Keycloak. This access control vulnerability in Keycloak's OpenID Connect (OIDC) token introspection endpoint allows a confidential client to bypass audience restrictions. An attacker-controlled client with valid credentials can retrieve sensitive token claims intended for other resource servers, compromising the confidentiality of lightweight access tokens. This issue can be exploited remotely by any confidential client in the realm with valid credentials.
Product status
26.4.12-1 (rpm) before *
26.4-17 (rpm) before *
26.4-17 (rpm) before *
Timeline
| 2026-04-06: | Reported to Red Hat. |
| 2026-05-19: | Made public. |
Credits
Red Hat would like to thank Herdiyan Adam Putra for reporting this issue.
References
access.redhat.com/errata/RHSA-2026:19596 (RHSA-2026:19596)
access.redhat.com/errata/RHSA-2026:19597 (RHSA-2026:19597)
access.redhat.com/security/cve/CVE-2026-37979
bugzilla.redhat.com/show_bug.cgi?id=2455328 (RHBZ#2455328)