Medium severity4.3NVD Advisory· Published Mar 23, 2026· Updated Apr 1, 2026
CVE-2026-4628
CVE-2026-4628
Description
A flaw was found in Keycloak. An improper Access Control vulnerability in Keycloak’s User-Managed Access (UMA) resource_set endpoint allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false restriction. This occurs due to incomplete enforcement of access control checks on PUT operations to the resource_set endpoint. This issue enables unauthorized modification of protected resources, impacting data integrity.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-servicesMaven | <= 26.6.0 | — |
Affected products
1- cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:-:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- access.redhat.com/security/cve/CVE-2026-4628nvdVendor AdvisoryWEB
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingVendor AdvisoryWEB
- github.com/advisories/GHSA-4pgc-gfrr-wcmgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-4628ghsaADVISORY
News mentions
0No linked articles in our index yet.