No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| References |
|
Thu, 02 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an unauthenticated attacker to forge authorization codes. Successful exploitation can lead to the creation of admin-capable access tokens, resulting in privilege escalation. | |
| Title | Keycloak: keycloak: privilege escalation via forged authorization codes due to singleuseobjectprovider isolation flaw | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-653 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-02T14:24:41.770Z
Reserved: 2026-03-16T15:53:24.993Z
Link: CVE-2026-4282
Updated: 2026-04-02T14:23:43.727Z
Status : Received
Published: 2026-04-02T13:16:26.680
Modified: 2026-04-02T14:16:33.227
Link: CVE-2026-4282
No data.
OpenCVE Enrichment
No data.