Description
A flaw was found in Keycloak. This authentication vulnerability allows a remote attacker to replay `ExecuteActionsActionToken` tokens within Keycloak's WebAuthn (Web Authentication) flow. By intercepting an execute-actions email link, an attacker can register their own authenticator to a victim's account. This leads to unauthorized enrollment of a hardware-backed credential, enabling persistent account takeover.
Product status
26.4.12-1 (rpm) before *
26.4-17 (rpm) before *
26.4-17 (rpm) before *
Timeline
| 2026-04-06: | Reported to Red Hat. |
| 2026-05-19: | Made public. |
References
access.redhat.com/errata/RHSA-2026:19596 (RHSA-2026:19596)
access.redhat.com/errata/RHSA-2026:19597 (RHSA-2026:19597)
access.redhat.com/security/cve/CVE-2026-37982
bugzilla.redhat.com/show_bug.cgi?id=2455329 (RHBZ#2455329)