CVE-2026-4874
EUVD-2026-1614226.03.2026, 08:16
A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| redhat | build_of_keycloak | - |
| redhat | jboss_enterprise_application_platform | 8.0.0 |
| redhat | jboss_enterprise_application_platform_expansion_pack | - |
| redhat | single_sign-on | 7.0 |
𝑥
= Vulnerable software versions