VYPR
High severity7.5NVD Advisory· Published May 19, 2026· Updated May 20, 2026

CVE-2026-7507

CVE-2026-7507

Description

A session fixation vulnerability was found in Keycloak's login-actions endpoints. An unauthenticated attacker could exploit this flaw by pre-creating an authentication session and tricking a victim into visiting a maliciously crafted link. By leveraging the /login-actions/restart endpoint—which processes session handles without adequate CSRF protection or cookie ownership validation—an attacker can reset the authentication flow state. This causes Single Sign-On (SSO) to authenticate the victim transparently upon clicking the link, allowing the attacker to hijack the required-action form without needing the victim's credentials. A successful exploit could lead to complete account takeover, including highly privileged administrative accounts.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Session fixation in Keycloak's login-actions endpoints allows unauthenticated attackers to hijack authentication flows, leading to account takeover.

Vulnerability

A session fixation vulnerability exists in Keycloak's login-actions endpoints, specifically the /login-actions/restart endpoint, which processes session handles without adequate CSRF protection or cookie ownership validation [1]. An unauthenticated attacker can pre-create an authentication session and craft a malicious link. Affected versions include Keycloak before 26.4.12 and 26.2.16 [2][3][4].

Exploitation

The attacker needs no authentication; they can pre-create an authentication session and trick a victim into clicking a maliciously crafted link that invokes the /login-actions/restart endpoint. The endpoint resets the authentication flow state without verifying that the session handle belongs to the victim. This causes Single Sign-On (SSO) to authenticate the victim transparently upon clicking the link, allowing the attacker to hijack the required-action form without needing the victim's credentials [1].

Impact

Successful exploitation leads to complete account takeover, including highly privileged administrative accounts. The attacker gains the ability to impersonate the victim and perform actions as that user, potentially compromising the entire Keycloak deployment [1].

Mitigation

Red Hat released fixed versions: Keycloak 26.4.12 (standalone and OpenShift images) and Keycloak 26.2.16 (OpenShift images) on 2026-05-20 [2][3][4]. Users should upgrade to these versions. No workarounds are mentioned in the references. The vulnerability is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog as of the publication date.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.