Keycloak vulnerable to information disclosure via CORS header injection due to unvalidated JWT azp claim
Low severity
GitHub Reviewed
Published
Apr 6, 2026
to the GitHub Advisory Database
•
Updated Apr 8, 2026
Description
Published by the National Vulnerability Database
Apr 6, 2026
Published to the GitHub Advisory Database
Apr 6, 2026
Reviewed
Apr 8, 2026
Last updated
Apr 8, 2026
A flaw was found in Keycloak. A remote attacker can exploit a Cross-Origin Resource Sharing (CORS) header injection vulnerability in Keycloak's User-Managed Access (UMA) token endpoint. This flaw occurs because the
azpclaim from a client-supplied JSON Web Token (JWT) is used to set theAccess-Control-Allow-Originheader before the JWT signature is validated. When a specially crafted JWT with an attacker-controlledazpvalue is processed, this value is reflected as the CORS origin, even if the grant is later rejected. This can lead to the exposure of low-sensitivity information from authorization server error responses, weakening origin isolation, but only when a target client is misconfigured withwebOrigins: ["*"].References