Vulnerability Description
When Keycloak is started with `--features-disabled=account,account-api`, the Account REST API is only partially disabled. Five endpoints under the versioned path `/account/v1alpha1` remain fully functional — including both read and write operations — because they lack the `checkAccountApiEnabled()` gate that correctly blocks four other endpoints in the same REST service class. The user needs to have permissions to use the API.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Build Of Keycloak | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2026-7500Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2464126Issue Tracking
FAQ
What is CVE-2026-7500?
CVE-2026-7500 is a vulnerability with a CVSS score of 5.4 (MEDIUM). When Keycloak is started with `--features-disabled=account,account-api`, the Account REST API is only partially disabled. Five endpoints under the versioned path `/account/v1alpha1` remain fully funct...
How severe is CVE-2026-7500?
CVE-2026-7500 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7500?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Build Of Keycloak.