A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure.
Metrics
Affected Vendors & Products
References
History
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| References |
| |
| Metrics |
ssvc
|
Thu, 02 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure. | |
| Title | Keycloak: keycloak: information disclosure due to redirect_uri validation bypass | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-601 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-02T16:34:50.301Z
Reserved: 2026-03-10T09:25:23.875Z
Link: CVE-2026-3872
Updated: 2026-04-02T13:15:16.494Z
Status : Received
Published: 2026-04-02T13:16:26.390
Modified: 2026-04-02T14:16:32.817
Link: CVE-2026-3872
No data.
OpenCVE Enrichment
No data.