| ID |
CVE-2026-4874
|
| Sažetak |
A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure. |
| Reference |
|
| CVSS |
| Base: | 3.1 |
| Impact: | 1.4 |
| Exploitability: | 1.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
LOW |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| LOW |
NONE |
NONE |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
| Zadnje važnije ažuriranje |
26-03-2026 - 15:13 |
| Objavljeno |
26-03-2026 - 08:16 |