A flaw was found in Keycloak. A remote attacker can exploit differential error messages during the identity-first login flow when Organizations are enabled. This vulnerability allows an attacker to determine the existence of users, leading to information disclosure through user enumeration.
Metrics
Affected Vendors & Products
References
History
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat build Of Keycloak
|
|
| CPEs | cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:-:*:*:* | |
| Vendors & Products |
Redhat build Of Keycloak
|
Mon, 23 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. A remote attacker can exploit differential error messages during the identity-first login flow when Organizations are enabled. This vulnerability allows an attacker to determine the existence of users, leading to information disclosure through user enumeration. | |
| Title | Keycloak: keycloak: user enumeration via differential error messages | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-209 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2026-03-23T10:53:35.655Z
Updated: 2026-04-01T14:38:10.321Z
Reserved: 2026-03-23T08:36:31.514Z
Link: CVE-2026-4633
Updated: 2026-03-23T15:07:16.456Z
Status : Analyzed
Published: 2026-03-23T11:16:25.053
Modified: 2026-04-01T14:26:47.490
Link: CVE-2026-4633
No data.