A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat build Of Keycloak
|
|
| CPEs | cpe:/a:redhat:build_keycloak:26.2::el9 | |
| Vendors & Products |
Redhat build Of Keycloak
|
|
| References |
|
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| References |
| |
| Metrics |
ssvc
|
Thu, 02 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure. | |
| Title | Keycloak: keycloak: information disclosure due to redirect_uri validation bypass | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-601 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-02T16:34:50.301Z
Reserved: 2026-03-10T09:25:23.875Z
Link: CVE-2026-3872
Updated: 2026-04-02T13:15:16.494Z
Status : Awaiting Analysis
Published: 2026-04-02T13:16:26.390
Modified: 2026-04-03T16:10:52.680
Link: CVE-2026-3872
OpenCVE Enrichment
Updated: 2026-04-03T09:18:50Z