Description

A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.

INFO

Published Date :

2026-02-19T07:48:08.910Z

Last Modified :

2026-03-06T03:31:23.662Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2026-2733 vulnerability.

Vendors Products
Redhat
  • Build Keycloak
  • Build Of Keycloak
  • Jboss Enterprise Application Platform
  • Jboss Enterprise Application Platform Expansion Pack
  • Jbosseapxp
  • Red Hat Single Sign On
  • Single Sign-on

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact