CVE-2026-4874
ADVISORY - githubSummary
A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the client_session_host parameter during refresh token requests. This occurs when a Keycloak client is configured to use the backchannel.logout.url with the application.session.host placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.
Common Weakness Enumeration (CWE)
Server-Side Request Forgery (SSRF)
Server-Side Request Forgery (SSRF)
Server-Side Request Forgery (SSRF)
NIST
1.6
CVSS SCORE
3.1lowGitHub
1.6
CVSS SCORE
3.1lowRed Hat
1.6
CVSS SCORE
3.1lowChainguard
CGA-4gx6-j35v-22q2
-
minimos
MINI-fjg7-pcfc-jg7h
-
minimos
MINI-v6pv-3f3f-2qv5
-