Incorrect Behavior Order: Authorization Before Parsing and Canonicalization Affecting keycloak package, versions <26.5.7-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-KEYCLOAK-15954498
  • published9 Apr 2026
  • disclosed2 Apr 2026

Introduced: 2 Apr 2026

NewCVE-2026-4636  (opens in a new tab)
CWE-551  (opens in a new tab)

How to fix?

Upgrade Minimos:latest keycloak to version 26.5.7-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream keycloak package and not the keycloak package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.

CVSS Base Scores

version 3.1