CVE-2026-3872

| EUVD-2026-18206 HIGH
2026-04-02 redhat GHSA-cjm2-j6cm-6p6m
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
Patch Released
Apr 04, 2026 - 08:30 nvd
Patch available
Analysis Generated
Apr 02, 2026 - 13:15 vuln.today
EUVD ID Assigned
Apr 02, 2026 - 13:15 euvd
EUVD-2026-18206
CVE Published
Apr 02, 2026 - 12:37 nvd
HIGH 7.3

Description

A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure.

Analysis

Open redirect in Red Hat Build of Keycloak allows authenticated attackers with control over another path on the same web server to bypass wildcard-based redirect URI validation and steal OAuth access tokens. Attack requires low complexity and user interaction (CVSS 7.3). …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all Keycloak deployments and document which instances share web servers with user-controllable or third-party content paths. Within 7 days: Implement strict redirect URI whitelisting (exact matching, not wildcards) and disable any unnecessary path hosting on shared servers; review Keycloak authentication logs for suspicious redirect attempts. …

Sign in for detailed remediation steps.

Priority Score

37
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

CVE-2026-3872 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy