Organization invitation tokens in Keycloak are parsed without cryptographic signature verification during the registration flow. This allows an attacker to take a legitimate invitation, modify the organization ID (org_id) and the target email (eml) within the JWT payload, and successfully self-register into an unauthorized organization.