CVE-2026-37979
Description
A flaw was found in Keycloak. This access control vulnerability in Keycloak's OpenID Connect (OIDC) token introspection endpoint allows a confidential client to bypass audience restrictions. An attacker-controlled client with valid credentials can retrieve sensitive token claims intended for other resource servers, compromising the confidentiality of lightweight access tokens. This issue can be exploited remotely by any confidential client in the realm with valid credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Keycloak's OIDC token introspection endpoint does not enforce audience restrictions, allowing confidential clients to retrieve claims intended for other resource servers.
Vulnerability
A flaw in Keycloak's OpenID Connect token introspection endpoint fails to verify that the requesting client is included in the token's aud claim before returning claims. This affects Keycloak versions prior to 26.4.12 [1][2]. The endpoint does not enforce that the introspecting client is among the intended audiences, allowing unauthorized retrieval of token claims.
Exploitation
An attacker-controlled confidential client with valid credentials can call the introspection endpoint for any access token, including tokens issued to a different resource server. The attacker can obtain or intercept such tokens and use the introspection endpoint to retrieve the full claim set [4]. No additional privileges beyond valid client credentials are required.
Impact
Successful exploitation leads to information disclosure of sensitive token claims that were intended only for the legitimate audience. This breaks the confidentiality model of lightweight access tokens, potentially exposing attributes meant to be omitted from the token itself [1][4].
Mitigation
The issue is fixed in Keycloak version 26.4.12, released on 2026-05-20 [2][3]. Users should update to this version or later. No workaround is mentioned; updating is the recommended action.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.