CVE-2026-4874 | Teknoloji dünyasından en güncel haberleri ve güvenlikle ilgili gelişmeleri takip edin.

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter durin…
Low CVSS: 3.1

CVE-2026-4874

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.
Vendor
Redhat
Product
Build Of Keycloak
CWE
CWE-918
Yayın Tarihi
2026-03-26 08:16:22
Güncelleme
2026-04-01 14:11:28
Source Identifier
secalert@redhat.com
KEV Date Added
-

Kategoriler

Referanslar