Summary: A SAML Identity Provider that is disabled in the broker realm can still complete IdP‑initiated broker logins Requirements to exploit: The SAML protocol endpoint must be reachable Attacker needs to know the URL assigned to the broker in Keycloak for IDP initiated Attacker needs to log in with a valid user to the external IDP via SAML to be able to send a SAML response to Keycloak As the SAML IDP is disabled and no longer trusted, this violates C&A for Keycloak. Steps to reproduce: Target a Keycloak 26.5.2 instance. Set up an IDP in Keycloak that is disabled Generate a valid SAML response from the external IdP Send it to the Keycloak SAML endpoint for IDP initiated broker logins