CVE-2026-1035

3.1 LOW

📋 TL;DR

This vulnerability allows attackers to bypass Keycloak's refresh token rotation security feature when strict rotation is enabled. Concurrent refresh requests can issue multiple access tokens from the same refresh token, undermining single-use enforcement. This affects Keycloak servers with strict refresh token rotation enabled.

💻 Affected Systems

Products:
  • Keycloak
Versions: Specific versions not specified in CVE description; check vendor advisory for exact range
Operating Systems: All platforms running Keycloak
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when strict refresh token rotation is enabled (not default configuration)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could maintain persistent unauthorized access to protected resources by repeatedly obtaining new access tokens from a single compromised refresh token.

🟠

Likely Case

Unauthorized access token issuance allowing temporary access to protected resources until the refresh token eventually expires or is revoked.

🟢

If Mitigated

Limited impact if proper monitoring detects unusual token usage patterns and tokens have short expiration times.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires existing refresh token and ability to send concurrent requests; timing window exploitation needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2026-1035

Restart Required: Yes

Instructions:

1. Check current Keycloak version
2. Apply vendor-provided patch/update
3. Restart Keycloak service
4. Verify fix implementation

🔧 Temporary Workarounds

Disable Strict Refresh Token Rotation

all

Temporarily disable strict refresh token rotation feature until patch can be applied

Update Keycloak configuration to set 'refresh-token-rotation' to 'false' or less strict setting

Reduce Refresh Token Lifespan

all

Decrease refresh token validity period to limit potential abuse window

Set 'refresh-token-max-reuse' to lower value in Keycloak configuration

🧯 If You Can't Patch

  • Implement additional authentication layers for sensitive operations
  • Enhance monitoring for unusual token usage patterns and concurrent refresh attempts

🔍 How to Verify

Check if Vulnerable:

Check if strict refresh token rotation is enabled in Keycloak configuration and version matches affected range

Check Version:

Check Keycloak server logs or admin console for version information

Verify Fix Applied:

Test refresh token behavior with concurrent requests to ensure single-use enforcement works correctly

📡 Detection & Monitoring

Log Indicators:

  • Multiple access tokens issued from same refresh token within short timeframe
  • Concurrent refresh requests with same token ID

Network Indicators:

  • Unusual pattern of /token endpoint requests from same client

SIEM Query:

source="keycloak" AND "refresh_token" AND count by refresh_token_id > threshold

🔗 References

📤 Share & Export