CVE-2026-7500
Org.keycloak.keycloak-services: improper access control on keycloak server when the account account api feature is disabled
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
When Keycloak is started with `--features-disabled=account,account-api`, the Account REST API is only partially disabled. Five endpoints under the versioned path `/account/v1alpha1` remain fully functional โ including both read and write operations โ because they lack the `checkAccountApiEnabled()` gate that correctly blocks four other endpoints in the same REST service class. The user needs to have permissions to use the API.
| CWE | CWE-425 |
| Vendor | red hat |
| Product | red hat build of keycloak |
| Published | Apr 30, 2026 |
| Last Updated | Apr 30, 2026 |
Stay Ahead of the Next One
Get instant alerts for red hat red hat build of keycloak
Be the first to know when new medium vulnerabilities affecting red hat red hat build of keycloak are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Red Hat / Red Hat Build of Keycloak
All versions affected References
Credits
Red Hat would like to thank Evan Hendra for reporting this issue.