Description

A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the destination. This enables attackers to coerce the Keycloak server into making HTTP requests to internal or restricted network resources. As a result, attackers can probe internal services and cloud metadata endpoints, creating an information disclosure and reconnaissance risk.

INFO

Published Date :

2026-01-20T12:33:00.556Z

Last Modified :

2026-01-21T05:52:01.084Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2026-1180 vulnerability.

Vendors Products
Redhat
  • Build Keycloak
  • Jboss Enterprise Application Platform
  • Jbosseapxp
  • Red Hat Single Sign On

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact