Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cjm2-j6cm-6p6m | Keycloak: Redirect URI validation bypass via ..;/ path traversal in OIDC auth endpoint |
Solution
No solution given by the vendor.
Workaround
To mitigate this vulnerability, avoid using wildcards in `redirect_uri` configurations within Keycloak. Restricting `redirect_uri` to explicit, fully qualified URIs prevents the bypass of validation logic. This configuration change may require a service restart or reload to take effect.
Fri, 03 Apr 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat build Of Keycloak
|
|
| CPEs | cpe:/a:redhat:build_keycloak:26.2::el9 | |
| Vendors & Products |
Redhat build Of Keycloak
|
|
| References |
|
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| References |
| |
| Metrics |
ssvc
|
Thu, 02 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure. | |
| Title | Keycloak: keycloak: information disclosure due to redirect_uri validation bypass | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-601 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-02T16:34:50.301Z
Reserved: 2026-03-10T09:25:23.875Z
Link: CVE-2026-3872
Updated: 2026-04-02T13:15:16.494Z
Status : Awaiting Analysis
Published: 2026-04-02T13:16:26.390
Modified: 2026-04-03T16:10:52.680
Link: CVE-2026-3872
OpenCVE Enrichment
Updated: 2026-04-03T09:18:50Z
Github GHSA