CVE-2026-0976
Description
A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker can craft requests to mask path segments, potentially bypassing proxy-level path filtering. This could expose administrative or sensitive endpoints that operators believe are not externally reachable.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Keycloak accepts RFC-compliant matrix parameters in URL paths, allowing attackers to bypass reverse proxy path filtering and potentially expose sensitive endpoints.
Vulnerability
Overview
CVE-2026-0976 is an improper input validation vulnerability in Keycloak. The issue arises because Keycloak's JAX-RS routing layer accepts RFC-compliant matrix parameters (e.g., ;param) within URL path segments, while common reverse proxy configurations may ignore or mishandle these parameters when enforcing access restrictions [1][2][4]. This discrepancy allows a remote attacker to craft requests that mask path segments, potentially bypassing proxy-level path filtering.
Exploitation
An attacker can exploit this vulnerability by sending crafted requests such as /realms;abc/master/account to mask path segments [4]. The attack is network-based and requires no authentication to trigger the bypass, though authentication is still required to access the underlying endpoints [4]. The success of exploitation depends on the specific reverse proxy configuration deployed in front of Keycloak [4].
Impact
If successfully exploited, this vulnerability could expose administrative or sensitive endpoints that operators believe are not externally reachable [1][2][4]. While authentication is still required, the bypass of proxy-level filtering could allow attackers to reach endpoints that were intended to be hidden from external access, increasing the attack surface.
Mitigation
As of the publication date (2026-01-15), no patch has been released. Operators should review their reverse proxy configurations to ensure matrix parameters are handled consistently with Keycloak's behavior. The Keycloak project is aware of the issue and may provide updates in future releases [3][4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-quarkus-serverMaven | <= 26.2.5 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.