CVE-2026-2733

ADVISORY - github

Summary

A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Authorization

ADVISORY - github

Improper Authorization

ADVISORY - redhat

Improper Authorization


NIST

CREATED

UPDATED

ADVISORY IDCVE-2026-2733
EXPLOITABILITY SCORE

1.2

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

3.8low

GitHub

CREATED

UPDATED

EXPLOITABILITY SCORE

1.2

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

3.8low

Red Hat

CREATED

UPDATED

ADVISORY IDCVE-2026-2733
EXPLOITABILITY SCORE

1.2

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

3.8low