Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h4wv-g838-66g3 | Keycloak: Application-Level DoS via Scope Processing |
Thu, 16 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat build Of Keycloak
|
|
| CPEs | cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:build_of_keycloak:26.2.15:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:build_of_keycloak:26.2:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:build_of_keycloak:26.4.11:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:build_of_keycloak:26.4:*:*:*:text-only:*:*:* |
|
| Vendors & Products |
Redhat build Of Keycloak
|
Fri, 03 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.2::el9 | |
| References |
|
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| References |
|
Thu, 02 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server. | |
| Title | Keycloak: keycloak: denial of service via excessive processing of openid connect scope parameters | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-1050 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-03T17:23:00.421Z
Reserved: 2026-03-23T08:41:40.650Z
Link: CVE-2026-4634
Updated: 2026-04-03T17:22:55.273Z
Status : Analyzed
Published: 2026-04-02T13:16:27.027
Modified: 2026-04-16T20:50:10.327
Link: CVE-2026-4634
OpenCVE Enrichment
Updated: 2026-04-03T09:18:47Z
Github GHSA