Authentication Bypass by Primary Weakness Affecting org.keycloak:keycloak-services package, versions [,26.2.14)[26.3.0,26.4.10)[26.5.0,26.5.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.52% (67th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGKEYCLOAK-15440482
  • published8 Mar 2026
  • disclosed5 Mar 2026
  • creditUnknown

Introduced: 5 Mar 2026

CVE-2026-3047  (opens in a new tab)
CWE-305  (opens in a new tab)

How to fix?

Upgrade org.keycloak:keycloak-services to version 26.2.14, 26.4.10, 26.5.5 or higher.

Overview

org.keycloak:keycloak-services is an open source identity and access management solution for modern applications and services.

Affected versions of this package are vulnerable to Authentication Bypass by Primary Weakness when a disabled SAML client is configured as an Identity Provider (IdP)-initiated broker landing target. An attacker can gain unauthorized access to other enabled clients via a Single Sign-On (SSO) session.

CVSS Base Scores

version 4.0
version 3.1