Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2446 articles · 104533 vulns · 38/41 feeds (7d)
← Back to list
7.4
CVE-2026-4282EXPLOITEDPATCHED
red hat · keycloak

Keycloak: keycloak: privilege escalation via forged authorization codes due to singleuseobjectprovider isolation flaw

Description

A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an unauthenticated attacker to forge authorization codes. Successful exploitation can lead to the creation of admin-capable access tokens, resulting in privilege escalation.

Affected Products

VendorProductVersions
red hatkeycloakmaven/org.keycloak:keycloak-services: < 26.5.7

References

  • https://access.redhat.com/errata/RHSA-2026:6475(vendor-advisory, x_refsource_REDHAT)
  • https://access.redhat.com/errata/RHSA-2026:6476(vendor-advisory, x_refsource_REDHAT)
  • https://access.redhat.com/errata/RHSA-2026:6477(vendor-advisory, x_refsource_REDHAT)
  • https://access.redhat.com/errata/RHSA-2026:6478(vendor-advisory, x_refsource_REDHAT)
  • https://access.redhat.com/security/cve/CVE-2026-4282(vdb-entry, x_refsource_REDHAT)
  • https://bugzilla.redhat.com/show_bug.cgi?id=2448061(issue-tracking, x_refsource_REDHAT)

Related News (1 articles)

Tier C
VulDB4d ago
CVE-2026-4282 | Keycloak improper isolation or compartmentalization (RHSA-2026:6477)
→ No new info (linked only)
CVSS 3.17.4 HIGH
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
org.keycloak:keycloak-services@26.5.7
CWECWE-653
PublishedApr 2, 2026
Last enriched4d agov2
Trending Score27
Source articles1
Independent1
Info Completeness8/14
Missing: versions, epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-33540EXP
Distribution affected by pull-through cache credential exfiltration via www-authenticate bearer realm
Trending: 66
CRITICALCVE-2026-5704
Tar: tar: hidden file injection via crafted archives
Trending: 31
HIGHCVE-2026-4634EXP
Keycloak: keycloak: denial of service via excessive processing of openid connect scope parameters
Trending: 30
HIGHCVE-2026-3872EXP
Keycloak: keycloak: information disclosure due to redirect_uri validation bypass
Trending: 27
HIGHCVE-2026-4636EXP
Keycloak: keycloak: uma policy bypass allows authenticated users to gain unauthorized access to victim-owned resources.
Trending: 27

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 2, 2026
Discovered by ZDM
Apr 2, 2026
Updated: severity, activelyExploited
Apr 2, 2026
Actively Exploited
Apr 2, 2026
Patch Available
Apr 2, 2026

Version History

v2
Last enriched 4d ago
v2Tier C4d ago

Updated severity to HIGH, marked as actively exploited, and noted no exploit available.

severityactivelyExploited
via VulDB
v14d ago

Initial creation