A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure.
PUBLISHED5.2CWE-280
Keycloak: keycloak: information disclosure via improper role enforcement in uma 2.0 protection api
Problem type
Affected products
Red Hat
Red Hat Build of Keycloak
References
access.redhat.com
https://access.redhat.com/security/cve/CVE-2026-3190
RHBZ#2442572
https://bugzilla.redhat.com/show_bug.cgi?id=2442572
GitHub Security Advisories
GHSA-q35r-vvhv-vx5h
A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for...
https://github.com/advisories/GHSA-q35r-vvhv-vx5hA flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the uma_protection role check. This allows any authenticated user with a token issued for a resource server client, even without the uma_protection role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-3190Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-3190",
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"dateUpdated": "2026-03-26T19:12:38.438Z",
"dateReserved": "2026-02-25T08:35:07.988Z",
"datePublished": "2026-03-26T19:12:38.438Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat",
"dateUpdated": "2026-03-26T19:12:38.438Z"
},
"datePublic": "2026-02-25T07:07:00.000Z",
"title": "Keycloak: keycloak: information disclosure via improper role enforcement in uma 2.0 protection api",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure."
}
],
"affected": [
{
"vendor": "Red Hat",
"product": "Red Hat Build of Keycloak",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "rhbk/keycloak-rhel9",
"cpes": [
"cpe:/a:redhat:build_keycloak:"
],
"defaultStatus": "affected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Handling of Insufficient Permissions or Privileges",
"cweId": "CWE-280",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2026-3190",
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442572",
"name": "RHBZ#2442572",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
]
}
],
"metrics": [
{},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
}
}
],
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"timeline": [
{
"time": "2026-02-25T08:27:54.804Z",
"lang": "en",
"value": "Reported to Red Hat."
},
{
"time": "2026-02-25T07:07:00.000Z",
"lang": "en",
"value": "Made public."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Evan Hendra (Independent Security Researcher) for reporting this issue."
}
]
}
}
}