Keycloak mTLS Authentication Bypass via Reverse Proxy TLS Termination
Description
A vulnerability was found in Keycloak. Deployments of Keycloak with a reverse proxy not using pass-through termination of TLS, with mTLS enabled, are affected. This issue may allow an attacker on the local network to authenticate as any user or client that leverages mTLS as the authentication mechanism.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Keycloak deployments with mTLS and non-pass-through TLS termination allow local network attackers to bypass mTLS authentication.
Vulnerability
Overview
A vulnerability in Keycloak affects deployments that enable mutual TLS (mTLS) authentication behind a reverse proxy that terminates TLS connections without pass-through. Under this configuration, the reverse proxy handles TLS decryption before forwarding requests to Keycloak, stripping the original client certificate context. This bug allows an attacker positioned on the local network to present arbitrary client certificates, effectively impersonating any user or client that relies on mTLS for authentication [1][2].
Attack
Vector and Exploitation
The attack requires only local network access to the reverse proxy, with no privileges required and no user interaction. The attack complexity is low, as the attacker can craft or reuse certificates to bypass the intended authentication mechanism. The scope of the vulnerability changes from the reverse proxy to the Keycloak backend, enabling unauthorized access to protected resources [2].
Impact
Successful exploitation leads to complete loss of confidentiality and integrity for resources protected by mTLS. An attacker can authenticate as any mTLS-enabled user or client, gaining unauthorized access to sensitive data, performing actions on behalf of legitimate identities, and potentially escalating privileges within the Keycloak realm [1][3].
Mitigation
As of the publication date, Keycloak has not released a patch specifically for this issue. Administrators are advised to configure their reverse proxies to use pass-through TLS termination (TCP-level proxying) when mTLS is required, ensuring the client certificate is preserved for Keycloak validation. Reviewing the official advisory and monitoring for updates is recommended [2][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-coreMaven | < 26.0.6 | 26.0.6 |
Affected products
29- osv-coords27 versionspkg:apk/chainguard/keycloakpkg:apk/chainguard/keycloak-bitnami-compatpkg:apk/chainguard/keycloak-bitnami-fipspkg:apk/chainguard/keycloak-compatpkg:apk/chainguard/keycloak-config-clipkg:apk/chainguard/keycloak-config-cli-bitnami-compatpkg:apk/chainguard/keycloak-config-cli-compatpkg:apk/chainguard/keycloak-config-cli-iamguarded-compatpkg:apk/chainguard/keycloak-fipspkg:apk/chainguard/keycloak-fips-bitnami-compatpkg:apk/chainguard/keycloak-fips-policy-140-2pkg:apk/chainguard/keycloak-fips-policy-140-3pkg:apk/chainguard/keycloak-iamguarded-compatpkg:apk/chainguard/keycloak-iamguarded-fipspkg:apk/chainguard/keycloak-operatorpkg:apk/chainguard/keycloak-operator-compatpkg:apk/wolfi/keycloakpkg:apk/wolfi/keycloak-bitnami-compatpkg:apk/wolfi/keycloak-compatpkg:apk/wolfi/keycloak-config-clipkg:apk/wolfi/keycloak-config-cli-bitnami-compatpkg:apk/wolfi/keycloak-config-cli-compatpkg:apk/wolfi/keycloak-config-cli-iamguarded-compatpkg:apk/wolfi/keycloak-iamguarded-compatpkg:apk/wolfi/keycloak-operatorpkg:apk/wolfi/keycloak-operator-compatpkg:maven/org.keycloak/keycloak-core
< 26.0.6-r0+ 26 more
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 6.4.0-r1
- (no CPE)range: < 6.4.0-r1
- (no CPE)range: < 6.4.0-r1
- (no CPE)range: < 6.4.0-r1
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 6.4.0-r1
- (no CPE)range: < 6.4.0-r1
- (no CPE)range: < 6.4.0-r1
- (no CPE)range: < 6.4.0-r1
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6-r0
- (no CPE)range: < 26.0.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.