Improper Authorization vulnerability in the Docker v2 authentication endpoint (/protocol/docker-v2/auth) of Keycloak. The issue occurs because the server fails to validate the client’s “Enabled” status before minting an access token. Even after the client is administratively disabled, the endpoint continues to issue valid authentication tokens when provided with valid user credentials and client ID. This allows authenticated users to bypass intended administrative restrictions, potentially enabling unauthorized access to container registry resources associated with the disabled client.