Keycloak has an improper input validation vulnerability
Low severity
GitHub Reviewed
Published
Jan 15, 2026
to the GitHub Advisory Database
•
Updated Jan 15, 2026
Package
Affected versions
<= 26.2.5
Patched versions
None
Description
Published by the National Vulnerability Database
Jan 15, 2026
Published to the GitHub Advisory Database
Jan 15, 2026
Reviewed
Jan 15, 2026
Last updated
Jan 15, 2026
A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker can craft requests to mask path segments, potentially bypassing proxy-level path filtering. This could expose administrative or sensitive endpoints that operators believe are not externally reachable.
References