Server-Side Request Forgery (SSRF) Affecting keycloak-fips-doc package, versions <26.5.7-r0


Severity

Recommended
0.0
low
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.02% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-KEYCLOAKFIPSDOC-15922460
  • published7 Apr 2026
  • disclosed26 Mar 2026

Introduced: 26 Mar 2026

NewCVE-2026-4874  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade Minimos:latest keycloak-fips-doc to version 26.5.7-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream keycloak-fips-doc package and not the keycloak-fips-doc package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the client_session_host parameter during refresh token requests. This occurs when a Keycloak client is configured to use the backchannel.logout.url with the application.session.host placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.

CVSS Base Scores

version 3.1