CVE-2026-3047

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication in Keycloak by exploiting a disabled SAML client configured as an Identity Provider-initiated broker landing target. Attackers can gain unauthorized access to other enabled clients without re-authentication, establishing Single Sign-On sessions they shouldn't have. Organizations using Keycloak with SAML identity provider configurations are affected.

💻 Affected Systems

Products:
  • Keycloak
Versions: Specific versions not provided in CVE, but Red Hat advisories indicate affected Red Hat build of Keycloak versions
Operating Systems: All platforms running Keycloak
Default Config Vulnerable: ✅ No
Notes: Only affects configurations where a disabled SAML client is configured as an IdP-initiated broker landing target. Standard SAML configurations without this specific setup are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all applications integrated with the vulnerable Keycloak instance, allowing attackers to access sensitive data and systems as any user without authentication.

🟠

Likely Case

Unauthorized access to multiple applications behind the Keycloak SSO, potentially leading to data breaches and privilege escalation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent lateral movement from compromised applications.

🌐 Internet-Facing: HIGH - Keycloak is often exposed to the internet for authentication services, making this directly exploitable by remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to escalate privileges and access restricted internal applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of the disabled SAML client endpoint but doesn't require authentication. Attackers need to understand SAML IdP-initiated flows.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat advisories for specific patched versions

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2026-3047

Restart Required: Yes

Instructions:

1. Review Red Hat advisories RHSA-2026:3925, RHSA-2026:3926, RHSA-2026:3947, RHSA-2026:3948. 2. Update to the patched version of Keycloak. 3. Restart Keycloak service. 4. Verify the fix by testing SAML IdP-initiated flows.

🔧 Temporary Workarounds

Remove disabled SAML client as IdP landing target

all

Remove any disabled SAML clients from being configured as Identity Provider-initiated broker landing targets

Navigate to Keycloak admin console > Clients > Select disabled SAML client > Settings > Remove from IdP-initiated SSO URL configurations

Network isolation

linux

Restrict access to Keycloak SAML endpoints from untrusted networks

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port protocol="tcp" port="8080,8443" accept'
firewall-cmd --reload

🧯 If You Can't Patch

  • Ensure no disabled SAML clients are configured as IdP-initiated broker landing targets
  • Implement network segmentation to isolate Keycloak from internet exposure and restrict access to SAML endpoints

🔍 How to Verify

Check if Vulnerable:

Check Keycloak admin console for any disabled SAML clients configured in IdP-initiated SSO URLs. Review SAML client configurations for disabled status and landing target settings.

Check Version:

For Red Hat Keycloak: rpm -q keycloak; For standalone: check keycloak-server.log or admin console version info

Verify Fix Applied:

After patching, attempt to reproduce the vulnerability by accessing a disabled SAML client's IdP-initiated endpoint - it should properly reject the request.

📡 Detection & Monitoring

Log Indicators:

  • Successful authentication events from disabled SAML clients
  • SAML responses processed for disabled client IDs
  • Unusual SSO session creations from unexpected sources

Network Indicators:

  • HTTP requests to SAML endpoints with disabled client identifiers
  • SAML assertions being sent to disabled client endpoints

SIEM Query:

source="keycloak" AND (client_status="disabled" AND auth_outcome="success") OR (saml_client_id="DISABLED_CLIENT_ID" AND event_type="saml_response")

🔗 References

📤 Share & Export