Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.9
Keycloak Server: Admins Can Modify Sensitive User Data
CVE-2026-0871
GHSA-v4jw-m6rm-399h
Summary
Administrators with certain permissions can make unwanted changes to user profiles, even when access is restricted. This could lead to sensitive user information being altered. Keycloak users should ensure administrators only have necessary permissions and consider reviewing access controls to prevent this risk.
What to do
- Update keycloak org.keycloak:keycloak-server-spi-private to version 26.5.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| keycloak | org.keycloak:keycloak-server-spi-private | <= 26.5.2 | 26.5.2 |
| redhat | build_of_keycloak | <= 26.4.9 | – |
| redhat | build_of_keycloak | All versions | – |
| redhat | keycloak | <= 26.4.0 | – |
Original title
Keycloak Server Private SPI: Improper Access Control Allows Administrators to Bypass Attribute Visibility Restrictions and Modify Unmanaged User Profile Attributes
Original description
A flaw was found in Keycloak. An administrator with `manage-users` permission can bypass the "Only administrators can view" setting for unmanaged attributes, allowing them to modify these attributes. This improper access control can lead to unauthorized changes to user profiles, even when the system is configured to restrict such modifications.
nvd CVSS3.1
4.9
Vulnerability type
CWE-266
Incorrect Privilege Assignment
CWE-284
Improper Access Control
- https://access.redhat.com/errata/RHSA-2026:2365 Vendor Advisory
- https://access.redhat.com/errata/RHSA-2026:2366 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-0871 Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2428881 Issue Tracking Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0871
- https://github.com/keycloak/keycloak/issues/45873
- https://github.com/keycloak/keycloak/commit/9d0f679ecea405958f167fcd0f4a6db6ae32...
- https://github.com/advisories/GHSA-v4jw-m6rm-399h
Published: 27 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026