🔐 CVE Alert

CVE-2026-7507

HIGH 7.5

Org.keycloak/keycloak-services: session fixation in oidc login flow that can lead to account takeover

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
11th

A session fixation vulnerability was found in Keycloak's login-actions endpoints. An unauthenticated attacker could exploit this flaw by pre-creating an authentication session and tricking a victim into visiting a maliciously crafted link. By leveraging the /login-actions/restart endpoint—which processes session handles without adequate CSRF protection or cookie ownership validation—an attacker can reset the authentication flow state. This causes Single Sign-On (SSO) to authenticate the victim transparently upon clicking the link, allowing the attacker to hijack the required-action form without needing the victim's credentials. A successful exploit could lead to complete account takeover, including highly privileged administrative accounts.

CWE CWE-290
Vendor red hat
Product red hat build of keycloak 26.2
Published May 19, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for red hat red hat build of keycloak 26.2

Be the first to know when new high vulnerabilities affecting red hat red hat build of keycloak 26.2 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat build of Keycloak 26.2
All versions affected
Red Hat / Red Hat build of Keycloak 26.2
All versions affected
Red Hat / Red Hat build of Keycloak 26.2
All versions affected
Red Hat / Red Hat build of Keycloak 26.2.16
All versions affected
Red Hat / Red Hat build of Keycloak 26.4
All versions affected
Red Hat / Red Hat build of Keycloak 26.4
All versions affected
Red Hat / Red Hat build of Keycloak 26.4
All versions affected
Red Hat / Red Hat build of Keycloak 26.4.12
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
access.redhat.com: https://access.redhat.com/errata/RHSA-2026:19594 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:19595 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:19596 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:19597 access.redhat.com: https://access.redhat.com/security/cve/CVE-2026-7507 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2464145

Credits

Red Hat would like to thank Hacking Team (Calif.io) for reporting this issue.