A flaw was found in Keycloak’s CIBA feature where insufficient validation of client-configured backchannel notification endpoints could allow blind server-side requests to internal services.
History

Mon, 02 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Mon, 02 Feb 2026 07:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keycloak’s CIBA feature where insufficient validation of client-configured backchannel notification endpoints could allow blind server-side requests to internal services.
Title Keycloak: blind server-side request forgery (ssrf) via ciba backchannel notification endpoint in keycloak
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-918
CPEs cpe:/a:redhat:build_keycloak:
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2026-02-02T07:17:46.557Z

Updated: 2026-02-02T14:07:02.915Z

Reserved: 2026-01-28T08:08:15.419Z

Link: CVE-2026-1518

cve-icon Vulnrichment

Updated: 2026-02-02T14:06:50.326Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-02T08:16:06.217

Modified: 2026-02-03T16:44:36.630

Link: CVE-2026-1518

cve-icon Redhat

Severity : Low

Publid Date: 2026-01-28T00:00:00Z

Links: CVE-2026-1518 - Bugzilla