HomeRedhatCVE-2026-3047

CVE-2026-3047

HIGH
8.8CVSS
Published: 2026-03-05
Updated: 2026-03-26
AI Analysis

Description

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-305

Metadata

Primary Vendor
REDHAT
Published
3/5/2026
Last Modified
3/26/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

redhat : build_of_keycloakredhat : build_of_keycloakredhat : build_of_keycloakredhat : build_of_keycloakredhat : build_of_keycloakredhat : keycloak

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-3047 | HIGH Severity | CVEDatabase.com | CVEDatabase.com