{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T05:24:36.040","vulnerabilities":[{"cve":{"id":"CVE-2026-1486","sourceIdentifier":"secalert@redhat.com","published":"2026-02-09T20:15:55.717","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer) retrieves the IdP configuration but does not filter for isEnabled=false. If an administrator disables an IdP (e.g., due to a compromise or offboarding), an entity possessing that IdP's signing key can still generate valid JWT assertions that Keycloak accepts, resulting in the issuance of valid access tokens."},{"lang":"es","value":"Se encontró un fallo en Keycloak. Existe una vulnerabilidad en el flujo jwt-authorization-grant donde el servidor no verifica si un Proveedor de Identidad (IdP) está habilitado antes de emitir tokens. El mecanismo de búsqueda del emisor (lookupIdentityProviderFromIssuer) recupera la configuración del IdP pero no filtra por isEnabled=false. Si un administrador deshabilita un IdP (por ejemplo, debido a un compromiso o una baja), una entidad que posea la clave de firma de ese IdP aún puede generar aserciones JWT válidas que Keycloak acepta, lo que resulta en la emisión de tokens de acceso válidos."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-358"}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2026:2365","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2026:2366","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2026-1486","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2433347","source":"secalert@redhat.com"}]}}]}