CVE-2026-4366

Severity
5.8MEDIUM
EPSS
0.0%
top 90.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 18

Description

A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintended requests to internal or restricted resources. As a result, sensitive internal services such as cloud metadata endpoints could be accessed. This issue may lead to information disclosure and enable attackers to map internal network infrastructure.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-g2qr-3mxm-86jj: A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain clie2026-03-18
CVEList
Keycloak-services: blind server-side request forgery (ssrf) via http redirect handling in keycloak2026-03-18

📋Vendor Advisories

1
Red Hat
keycloak-services: Blind Server-Side Request Forgery (SSRF) via HTTP Redirect Handling in Keycloak2026-03-18

🕵️Threat Intelligence

1
Wiz
CVE-2026-4366 Impact, Exploitability, and Mitigation Steps | Wiz