CVE-2026-2733
ADVISORY - githubSummary
A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.
NIST
CREATED
UPDATED
ADVISORY IDCVE-2026-2733
EXPLOITABILITY SCORE
1.2
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
3.8lowGitHub
CREATED
UPDATED
ADVISORY IDGHSA-fjf4-6f34-w64q
EXPLOITABILITY SCORE
1.2
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
3.8lowRed Hat
CREATED
UPDATED
ADVISORY IDCVE-2026-2733
EXPLOITABILITY SCORE
1.2
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)