Bug 2427768 (CVE-2026-0707) - CVE-2026-0707 keycloak: Keycloak Authorization Header Parsing Leading to Potential Security Control Bypass
Summary: CVE-2026-0707 keycloak: Keycloak Authorization Header Parsing Leading to Pote...
Keywords:
Status: NEW
Alias: CVE-2026-0707
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-08 02:54 UTC by OSIDB Bzimport
Modified: 2026-01-08 02:57 UTC (History)
8 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-08 02:54:12 UTC
Keycloak’s authentication pipeline excessively tolerates non-standard Bearer token formats (case variations, Tab characters, multiple spaces, mixed whitespace) in the Authorization header, creating inconsistencies with front-end security controls (WAF/proxies) and enabling potential bypass risks.


Note You need to log in before you can comment on or make changes to this bug.