A flaw was found in Keycloak’s CIBA feature where insufficient validation of client-configured backchannel notification endpoints could allow blind server-side requests to internal services.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 02 Feb 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak’s CIBA feature where insufficient validation of client-configured backchannel notification endpoints could allow blind server-side requests to internal services. | |
| Title | Keycloak: blind server-side request forgery (ssrf) via ciba backchannel notification endpoint in keycloak | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2026-02-02T07:17:46.557Z
Updated: 2026-02-02T14:07:02.915Z
Reserved: 2026-01-28T08:08:15.419Z
Link: CVE-2026-1518
Updated: 2026-02-02T14:06:50.326Z
Status : Awaiting Analysis
Published: 2026-02-02T08:16:06.217
Modified: 2026-02-03T16:44:36.630
Link: CVE-2026-1518
ReportizFlow