VYPR
Low severity3.7NVD Advisory· Published Jan 15, 2026· Updated Apr 15, 2026

CVE-2026-0976

CVE-2026-0976

Description

A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker can craft requests to mask path segments, potentially bypassing proxy-level path filtering. This could expose administrative or sensitive endpoints that operators believe are not externally reachable.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Keycloak accepts RFC-compliant matrix parameters in URL paths, allowing attackers to bypass reverse proxy path filtering and potentially expose sensitive endpoints.

Vulnerability

Overview

CVE-2026-0976 is an improper input validation vulnerability in Keycloak. The issue arises because Keycloak's JAX-RS routing layer accepts RFC-compliant matrix parameters (e.g., ;param) within URL path segments, while common reverse proxy configurations may ignore or mishandle these parameters when enforcing access restrictions [1][2][4]. This discrepancy allows a remote attacker to craft requests that mask path segments, potentially bypassing proxy-level path filtering.

Exploitation

An attacker can exploit this vulnerability by sending crafted requests such as /realms;abc/master/account to mask path segments [4]. The attack is network-based and requires no authentication to trigger the bypass, though authentication is still required to access the underlying endpoints [4]. The success of exploitation depends on the specific reverse proxy configuration deployed in front of Keycloak [4].

Impact

If successfully exploited, this vulnerability could expose administrative or sensitive endpoints that operators believe are not externally reachable [1][2][4]. While authentication is still required, the bypass of proxy-level filtering could allow attackers to reach endpoints that were intended to be hidden from external access, increasing the attack surface.

Mitigation

As of the publication date (2026-01-15), no patch has been released. Operators should review their reverse proxy configurations to ensure matrix parameters are handled consistently with Keycloak's behavior. The Keycloak project is aware of the issue and may provide updates in future releases [3][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-quarkus-serverMaven
<= 26.2.5

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.