UNKNOWNCVE-2026-37977

Keycloak: org.keycloak.protocol.oidc.grants.ciba: keycloak: information disclosure via cors header injection due to unvalidated jwt azp claim

Platform

java

Component

keycloak

Fixed in

2.5.4

A flaw was found in Keycloak. A remote attacker can exploit a Cross-Origin Resource Sharing (CORS) header injection vulnerability in Keycloak's User-Managed Access (UMA) token endpoint. This flaw occurs because the `azp` claim from a client-supplied JSON Web Token (JWT) is used to set the `Access-Control-Allow-Origin` header before the JWT signature is validated. When a specially crafted JWT with an attacker-controlled `azp` value is processed, this value is reflected as the CORS origin, even if the grant is later rejected. This can lead to the exposure of low-sensitivity information from authorization server error responses, weakening origin isolation, but only when a target client is misconfigured with `webOrigins: ["*"]`.

How to fix

Actualice Keycloak a la versión 2.5.4 o superior para mitigar la vulnerabilidad.  La actualización corrige la validación del claim 'azp' en el JWT, previniendo la inyección de encabezados CORS.  Asegúrese de revisar la documentación de Red Hat para obtener instrucciones específicas de actualización para su entorno.

Monitor your dependencies automatically

Get notified when new vulnerabilities affect your projects. Free forever.

Start free
CVE-2026-37977 — Vulnerability Details | NextGuard | NextGuard