Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-szbr-v2vq-3kbn
Vulnerability ID VCID-szbr-v2vq-3kbn
Aliases CVE-2026-3121
GHSA-7xf9-4jfc-wgm4
Summary Keycloak: manage-clients permission escalates to full realm admin access A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over roles, users, or other administrative functions within the realm. This privilege escalation can occur when admin permissions are enabled at the realm level.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2026:6477
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2026:6477
ssvc Track https://access.redhat.com/errata/RHSA-2026:6477
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2026:6478
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2026:6478
ssvc Track https://access.redhat.com/errata/RHSA-2026:6478
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3121.json
cvssv3.1 6.5 https://access.redhat.com/security/cve/CVE-2026-3121
generic_textual MODERATE https://access.redhat.com/security/cve/CVE-2026-3121
ssvc Track https://access.redhat.com/security/cve/CVE-2026-3121
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
epss 0.0003 https://api.first.org/data/v1/epss?cve=CVE-2026-3121
cvssv3.1 6.5 https://bugzilla.redhat.com/show_bug.cgi?id=2442277
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=2442277
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2442277
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-7xf9-4jfc-wgm4
cvssv3.1 6.5 https://github.com/keycloak/keycloak
generic_textual MODERATE https://github.com/keycloak/keycloak
cvssv3.1 6.5 https://github.com/keycloak/keycloak/commit/79ab3110a257fb8d6f1a664c916687128094ed01
generic_textual MODERATE https://github.com/keycloak/keycloak/commit/79ab3110a257fb8d6f1a664c916687128094ed01
cvssv3.1 6.5 https://github.com/keycloak/keycloak/issues/46719
generic_textual MODERATE https://github.com/keycloak/keycloak/issues/46719
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2026-3121
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2026-3121
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2026:6477
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-30T13:58:46Z/ Found at https://access.redhat.com/errata/RHSA-2026:6477
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2026:6478
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-30T13:58:46Z/ Found at https://access.redhat.com/errata/RHSA-2026:6478
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3121.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/security/cve/CVE-2026-3121
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-30T13:58:46Z/ Found at https://access.redhat.com/security/cve/CVE-2026-3121
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2442277
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-30T13:58:46Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2442277
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak/commit/79ab3110a257fb8d6f1a664c916687128094ed01
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak/issues/46719
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2026-3121
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.01718
EPSS Score 0.00012
Published At April 29, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:54:02.970456+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-7xf9-4jfc-wgm4/GHSA-7xf9-4jfc-wgm4.json 38.0.0