Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-y1h3-yyn9-53fr
Vulnerability ID VCID-y1h3-yyn9-53fr
Aliases CVE-2026-2603
GHSA-x4p7-7chp-64hq
Summary Keycloak: Unauthorized authentication via disabled SAML Identity Provider A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to complete broker logins even when the SAML Identity Provider is disabled, leading to unauthorized authentication.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2026:3925
generic_textual HIGH https://access.redhat.com/errata/RHSA-2026:3925
ssvc Track* https://access.redhat.com/errata/RHSA-2026:3925
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2026:3926
generic_textual HIGH https://access.redhat.com/errata/RHSA-2026:3926
ssvc Track* https://access.redhat.com/errata/RHSA-2026:3926
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2026:3947
generic_textual HIGH https://access.redhat.com/errata/RHSA-2026:3947
ssvc Track* https://access.redhat.com/errata/RHSA-2026:3947
cvssv3.1 8.1 https://access.redhat.com/errata/RHSA-2026:3948
generic_textual HIGH https://access.redhat.com/errata/RHSA-2026:3948
ssvc Track* https://access.redhat.com/errata/RHSA-2026:3948
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2603.json
cvssv3.1 8.1 https://access.redhat.com/security/cve/CVE-2026-2603
generic_textual HIGH https://access.redhat.com/security/cve/CVE-2026-2603
ssvc Track* https://access.redhat.com/security/cve/CVE-2026-2603
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00192 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00192 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00227 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00227 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00227 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00227 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2026-2603
cvssv3.1 8.1 https://bugzilla.redhat.com/show_bug.cgi?id=2440300
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=2440300
ssvc Track* https://bugzilla.redhat.com/show_bug.cgi?id=2440300
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-x4p7-7chp-64hq
cvssv3.1 8.1 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1 8.1 https://github.com/keycloak/keycloak/commit/8ed7e59dc08d79751a27c23aadb590f06b43f132
generic_textual HIGH https://github.com/keycloak/keycloak/commit/8ed7e59dc08d79751a27c23aadb590f06b43f132
cvssv3.1 8.1 https://github.com/keycloak/keycloak/issues/46911
generic_textual HIGH https://github.com/keycloak/keycloak/issues/46911
cvssv3.1 8.1 https://github.com/keycloak/keycloak/pull/46932
generic_textual HIGH https://github.com/keycloak/keycloak/pull/46932
cvssv3.1 8.1 https://nvd.nist.gov/vuln/detail/CVE-2026-2603
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2026-2603
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2026:3925
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-03-18T14:10:05Z/ Found at https://access.redhat.com/errata/RHSA-2026:3925
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2026:3926
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-03-18T14:10:05Z/ Found at https://access.redhat.com/errata/RHSA-2026:3926
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2026:3947
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-03-18T14:10:05Z/ Found at https://access.redhat.com/errata/RHSA-2026:3947
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/errata/RHSA-2026:3948
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-03-18T14:10:05Z/ Found at https://access.redhat.com/errata/RHSA-2026:3948
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2603.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/security/cve/CVE-2026-2603
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-03-18T14:10:05Z/ Found at https://access.redhat.com/security/cve/CVE-2026-2603
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2440300
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-03-18T14:10:05Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2440300
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak/commit/8ed7e59dc08d79751a27c23aadb590f06b43f132
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak/issues/46911
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/keycloak/keycloak/pull/46932
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2026-2603
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.38556
EPSS Score 0.00172
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:54:13.873507+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-x4p7-7chp-64hq/GHSA-x4p7-7chp-64hq.json 38.0.0