Low severity3.1NVD Advisory· Published Mar 12, 2026· Updated Apr 2, 2026
CVE-2026-2366
CVE-2026-2366
Description
A flaw was found in Keycloak. An authorization bypass vulnerability in the Keycloak Admin API allows any authenticated user, even those without administrative privileges, to enumerate the organization memberships of other users. This information disclosure occurs if the attacker knows the victim's unique identifier (UUID) and the Organizations feature is enabled.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@keycloak/keycloak-admin-clientnpm | <= 26.5.5 | — |
org.keycloak:keycloak-js-admin-clientMaven | <= 26.5.5 | — |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-r8jr-wg88-fq5cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-2366ghsaADVISORY
- access.redhat.com/errata/RHSA-2026:6477nvdWEB
- access.redhat.com/errata/RHSA-2026:6478nvdWEB
- access.redhat.com/security/cve/CVE-2026-2366nvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/keycloak/keycloak/issues/47062ghsaWEB
News mentions
0No linked articles in our index yet.