Improper Access Control Affecting keycloak-fips-doc package, versions <26.5.7-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-KEYCLOAKFIPSDOC-15922518
  • published7 Apr 2026
  • disclosed23 Mar 2026

Introduced: 23 Mar 2026

NewCVE-2026-4628  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade Minimos:latest keycloak-fips-doc to version 26.5.7-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream keycloak-fips-doc package and not the keycloak-fips-doc package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

A flaw was found in Keycloak. An improper Access Control vulnerability in Keycloak’s User-Managed Access (UMA) resource_set endpoint allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false restriction. This occurs due to incomplete enforcement of access control checks on PUT operations to the resource_set endpoint. This issue enables unauthorized modification of protected resources, impacting data integrity.

CVSS Base Scores

version 3.1