CVE-2026-3047
moderate-risk
Published 2026-03-05
A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.
Do I need to act?
-
0.52% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (6)
Affected Vendors
References (6)
Vendor Advisory
https://access.redhat.com/errata/RHSA-2026:3925
Vendor Advisory
https://access.redhat.com/errata/RHSA-2026:3926
Vendor Advisory
https://access.redhat.com/errata/RHSA-2026:3947
Vendor Advisory
https://access.redhat.com/errata/RHSA-2026:3948
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2026-3047
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2441966
45
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
2/34 · Minimal
Exposure
13/34 · Low