Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-gzz6-md9v-b3em
Vulnerability ID VCID-gzz6-md9v-b3em
Aliases CVE-2026-3009
GHSA-m297-3jv9-m927
Summary Keycloak allows authentication using an Identity Provider (IdP) even after it has been disabled by an administrator A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the administrative restriction. This undermines access control enforcement and may allow unauthorized authentication through a disabled external provider.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2026:3947
generic_textual HIGH https://access.redhat.com/errata/RHSA-2026:3947
ssvc Track https://access.redhat.com/errata/RHSA-2026:3947
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2026:3948
generic_textual HIGH https://access.redhat.com/errata/RHSA-2026:3948
ssvc Track https://access.redhat.com/errata/RHSA-2026:3948
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3009.json
cvssv3.1 8.1 https://access.redhat.com/security/cve/CVE-2026-3009
generic_textual HIGH https://access.redhat.com/security/cve/CVE-2026-3009
ssvc Track https://access.redhat.com/security/cve/CVE-2026-3009
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
epss 0.00032 https://api.first.org/data/v1/epss?cve=CVE-2026-3009
cvssv3.1 8.1 https://bugzilla.redhat.com/show_bug.cgi?id=2441867
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=2441867
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2441867
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-m297-3jv9-m927
cvssv3.1 8.1 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1 8.1 https://github.com/keycloak/keycloak/commit/4fd5367e6cc28cfa68fb2240fc459c12b1fdbf2a
generic_textual HIGH https://github.com/keycloak/keycloak/commit/4fd5367e6cc28cfa68fb2240fc459c12b1fdbf2a
cvssv3.1 8.1 https://github.com/keycloak/keycloak/issues/46911
generic_textual HIGH https://github.com/keycloak/keycloak/issues/46911
cvssv3.1 8.1 https://github.com/keycloak/keycloak/releases/tag/26.5.5
generic_textual HIGH https://github.com/keycloak/keycloak/releases/tag/26.5.5
cvssv3.1 8.1 https://nvd.nist.gov/vuln/detail/CVE-2026-3009
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2026-3009
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2026:3947
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-06T18:14:28Z/ Found at https://access.redhat.com/errata/RHSA-2026:3947
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2026:3948
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-06T18:14:28Z/ Found at https://access.redhat.com/errata/RHSA-2026:3948
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3009.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/security/cve/CVE-2026-3009
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-06T18:14:28Z/ Found at https://access.redhat.com/security/cve/CVE-2026-3009
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2441867
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-06T18:14:28Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2441867
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak/commit/4fd5367e6cc28cfa68fb2240fc459c12b1fdbf2a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak/issues/46911
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak/releases/tag/26.5.5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2026-3009
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.07686
EPSS Score 0.00027
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:53:58.593393+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-m297-3jv9-m927/GHSA-m297-3jv9-m927.json 38.0.0