Description
A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.
Problem types
Excessive Platform Resource Consumption within a Loop
Product status
26.2.15-1 (rpm) before *
26.2-18 (rpm) before *
26.2-18 (rpm) before *
26.4.11-1 (rpm) before *
26.4-14 (rpm) before *
26.4-14 (rpm) before *
Timeline
| 2026-03-23: | Reported to Red Hat. |
| 2026-04-02: | Made public. |
Credits
Red Hat would like to thank Slvrqn for reporting this issue.
References
access.redhat.com/errata/RHSA-2026:6475 (RHSA-2026:6475)
access.redhat.com/errata/RHSA-2026:6476 (RHSA-2026:6476)
access.redhat.com/errata/RHSA-2026:6477 (RHSA-2026:6477)
access.redhat.com/errata/RHSA-2026:6478 (RHSA-2026:6478)
access.redhat.com/security/cve/CVE-2026-4634
bugzilla.redhat.com/show_bug.cgi?id=2450250 (RHBZ#2450250)