Build of keycloak Vulnerabilities

Security vulnerability tracking for Redhat Build of keycloak

Last updated: Feb 27, 2026
Total CVEs

1

Critical

0

With Exploits

2

Last 30 Days

0

Vulnerability Timeline

1 vulnerabilities discovered over time for Build of keycloak

Severity Distribution

Critical0
0%
High0
0%
Medium1
100%
Low1
100%
DescriptionVendor / ProductExploit Status
CVE-2026-08714.9

An attacker with the `manage-users` permission can change user profile information that should be restricted, bypassing security settings meant to protect unmanaged attributes. This means that if someone has this admin role, they can make unauthorized modifications to user data, even when the system is supposed to prevent it.

redhatbuild of keycloak
Exploit Available
about 1 month agoFeb 27, 2026

About Redhat Build of keycloak Security

This page provides comprehensive security vulnerability tracking for Redhat Build of keycloak. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Build of keycloak updated to the latest version
  • • Subscribe to security advisories from Redhat
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately