Bug 2433347 (CVE-2026-1486) - CVE-2026-1486 org.keycloak.protocol.oidc.grants: Disabled identity providers are still accepted for JWT Authorization Grant
Summary: CVE-2026-1486 org.keycloak.protocol.oidc.grants: Disabled identity providers ...
Keywords:
Status: NEW
Alias: CVE-2026-1486
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-27 13:37 UTC by OSIDB Bzimport
Modified: 2026-02-09 18:25 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-27 13:37:59 UTC
A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer) retrieves the IdP configuration but does not filter for isEnabled=false. If an administrator disables an IdP (e.g., due to a compromise or offboarding), an entity possessing that IdP's signing key can still generate valid JWT assertions that Keycloak accepts, resulting in the issuance of valid access tokens.


Note You need to log in before you can comment on or make changes to this bug.