5.3
CVE-2026-4325
- EPSS 0.04%
- Veröffentlicht 02.04.2026 12:44:52
- Zuletzt bearbeitet 16.04.2026 20:51:22
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Keycloak: keycloak: replay of action tokens via improper handling of single-use entries
A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an attacker to delete arbitrary single-use entries, which can enable the replay of consumed action tokens, such as password reset links. This could lead to unauthorized access or account compromise.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Redhat ≫ Build Of Keycloak Version- SwEditiontext-only
Redhat ≫ Build Of Keycloak Version26.2 SwEditiontext-only
Redhat ≫ Build Of Keycloak Version26.2.15 SwEditiontext-only
Redhat ≫ Build Of Keycloak Version26.4 SwEditiontext-only
Redhat ≫ Build Of Keycloak Version26.4.11 SwEditiontext-only
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.119 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
|
CWE-653 Improper Isolation or Compartmentalization
The product does not properly compartmentalize or isolate functionality, processes, or resources that require different privilege levels, rights, or permissions.