Vulnerability Description
A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Build Of Keycloak | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:6475Vendor Advisory
- https://access.redhat.com/errata/RHSA-2026:6476Vendor Advisory
- https://access.redhat.com/errata/RHSA-2026:6477Vendor Advisory
- https://access.redhat.com/errata/RHSA-2026:6478Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-3872Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2445988Issue TrackingVendor Advisory
FAQ
What is CVE-2026-3872?
CVE-2026-3872 is a vulnerability with a CVSS score of 7.3 (HIGH). A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wil...
How severe is CVE-2026-3872?
CVE-2026-3872 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3872?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Build Of Keycloak.