Loading
A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.
Use CWE-1050, Redhat vendor hub and Build Of Keycloak product page to widen CVE-2026-4634 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-4636, CVE-2026-4282 and CVE-2026-3872 for nearby disclosures in the same product family.