2026-03-26 19:12CVE-2026-3190redhat
PUBLISHED5.2CWE-280

Keycloak: keycloak: information disclosure via improper role enforcement in uma 2.0 protection api

A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure.

Problem type

Affected products

Red Hat

Red Hat Build of Keycloak

References

GitHub Security Advisories

GHSA-q35r-vvhv-vx5h

A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for...

https://github.com/advisories/GHSA-q35r-vvhv-vx5h

A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the uma_protection role check. This allows any authenticated user with a token issued for a resource server client, even without the uma_protection role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-3190
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-3190",
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "dateUpdated": "2026-03-26T19:12:38.438Z",
    "dateReserved": "2026-02-25T08:35:07.988Z",
    "datePublished": "2026-03-26T19:12:38.438Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat",
        "dateUpdated": "2026-03-26T19:12:38.438Z"
      },
      "datePublic": "2026-02-25T07:07:00.000Z",
      "title": "Keycloak: keycloak: information disclosure via improper role enforcement in uma 2.0 protection api",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure."
        }
      ],
      "affected": [
        {
          "vendor": "Red Hat",
          "product": "Red Hat Build of Keycloak",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "rhbk/keycloak-rhel9",
          "cpes": [
            "cpe:/a:redhat:build_keycloak:"
          ],
          "defaultStatus": "affected"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Improper Handling of Insufficient Permissions or Privileges",
              "cweId": "CWE-280",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://access.redhat.com/security/cve/CVE-2026-3190",
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ]
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442572",
          "name": "RHBZ#2442572",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "format": "CVSS",
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "attackVector": "NETWORK",
            "attackComplexity": "LOW",
            "privilegesRequired": "LOW",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM"
          }
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
        }
      ],
      "timeline": [
        {
          "time": "2026-02-25T08:27:54.804Z",
          "lang": "en",
          "value": "Reported to Red Hat."
        },
        {
          "time": "2026-02-25T07:07:00.000Z",
          "lang": "en",
          "value": "Made public."
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Evan Hendra (Independent Security Researcher) for reporting this issue."
        }
      ]
    }
  }
}