CWE-551

Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

3 CVEs Avg CVSS 7.7 MITRE
1
CRITICAL
1
HIGH
1
MEDIUM
0
LOW
1
POC
0
KEV

Monthly

CVE-2026-4636 HIGH PATCH GHSA This Week

Authenticated users with uma_protection role in Red Hat Keycloak can bypass User-Managed Access policy validation to gain unauthorized access to victim-owned resources. The vulnerability (confirmed actively exploited - CISA KEV) enables attackers to inject arbitrary resource identifiers during policy creation, obtaining Requesting Party Tokens for resources they do not own. With CVSS 8.1 (High), network-accessible attack vector, and low complexity, this represents a significant access control bypass in enterprise identity management deployments. EPSS data and public exploit status not confirmed from available data.

Information Disclosure
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2016-20030 CRITICAL POC Act Now

User enumeration vulnerability in ZKTeco ZKBioSecurity 3.0 that allows unauthenticated attackers to discover valid usernames through partial character submissions to the authentication endpoint. A public proof-of-concept exploit is available, making this vulnerability actively exploitable, though it has a notably high CVSS score of 9.8 that appears inflated given the actual impact is limited to information disclosure.

Information Disclosure Zkteco Zkbiosecurity
NVD VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-0707 MEDIUM PATCH This Month

Keycloak's Authorization header parser improperly tolerates non-RFC 6750 compliant formatting, including tabs and case variations in Bearer token authentication. This lax validation could enable attackers to bypass authentication mechanisms or manipulate token validation logic in applications relying on strict Bearer token parsing. No patch is currently available for this medium-severity vulnerability.

Information Disclosure Redhat
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-4636
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Authenticated users with uma_protection role in Red Hat Keycloak can bypass User-Managed Access policy validation to gain unauthorized access to victim-owned resources. The vulnerability (confirmed actively exploited - CISA KEV) enables attackers to inject arbitrary resource identifiers during policy creation, obtaining Requesting Party Tokens for resources they do not own. With CVSS 8.1 (High), network-accessible attack vector, and low complexity, this represents a significant access control bypass in enterprise identity management deployments. EPSS data and public exploit status not confirmed from available data.

Information Disclosure
NVD
CVE-2016-20030
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

User enumeration vulnerability in ZKTeco ZKBioSecurity 3.0 that allows unauthenticated attackers to discover valid usernames through partial character submissions to the authentication endpoint. A public proof-of-concept exploit is available, making this vulnerability actively exploitable, though it has a notably high CVSS score of 9.8 that appears inflated given the actual impact is limited to information disclosure.

Information Disclosure Zkteco Zkbiosecurity
NVD VulDB
CVE-2026-0707
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Keycloak's Authorization header parser improperly tolerates non-RFC 6750 compliant formatting, including tabs and case variations in Bearer token authentication. This lax validation could enable attackers to bypass authentication mechanisms or manipulate token validation logic in applications relying on strict Bearer token parsing. No patch is currently available for this medium-severity vulnerability.

Information Disclosure Redhat
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy