A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer) retrieves the IdP configuration but does not filter for isEnabled=false. If an administrator disables an IdP (e.g., due to a compromise or offboarding), an entity possessing that IdP's signing key can still generate valid JWT assertions that Keycloak accepts, resulting in the issuance of valid access tokens.
History

Mon, 09 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer) retrieves the IdP configuration but does not filter for isEnabled=false. If an administrator disables an IdP (e.g., due to a compromise or offboarding), an entity possessing that IdP's signing key can still generate valid JWT assertions that Keycloak accepts, resulting in the issuance of valid access tokens.
Title Org.keycloak.protocol.oidc.grants: disabled identity providers are still accepted for jwt authorization grant
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-358
CPEs cpe:/a:redhat:build_keycloak:
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-02-09T18:36:10.268Z

Reserved: 2026-01-27T13:35:02.603Z

Link: CVE-2026-1486

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-09T20:15:55.717

Modified: 2026-02-09T20:15:55.717

Link: CVE-2026-1486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.