Bug 2448351 (CVE-2026-4325) - CVE-2026-4325 keycloak: Keycloak: Replay of action tokens via improper handling of single-use entries
Summary: CVE-2026-4325 keycloak: Keycloak: Replay of action tokens via improper handli...
Keywords:
Status: NEW
Alias: CVE-2026-4325
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-17 12:46 UTC by OSIDB Bzimport
Modified: 2026-04-02 12:35 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-17 12:46:42 UTC
Keycloak's SingleUseObjectProvider is a global flat key-value store used without type or namespace isolation. This allows an attacker to delete arbitrary single-use entries, enabling the replay of consumed action tokens such as password reset links.
Requirements to exploit:


Note You need to log in before you can comment on or make changes to this bug.