1
0
2
0
Vulnerability Timeline
1 vulnerabilities discovered over time for Build of keycloak
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-0871 | 4.9 | An attacker with the `manage-users` permission can change user profile information that should be restricted, bypassing security settings meant to protect unmanaged attributes. This means that if someone has this admin role, they can make unauthorized modifications to user data, even when the system is supposed to prevent it. | redhatbuild of keycloak | Exploit Available | about 1 month agoFeb 27, 2026 |
About Redhat Build of keycloak Security
This page provides comprehensive security vulnerability tracking for Redhat Build of keycloak. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Build of keycloak updated to the latest version
- • Subscribe to security advisories from Redhat
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately