Keycloak: UMA Policy Resource Injection Allows Unauthorized Cross-User Permission Grants
High severity
GitHub Reviewed
Published
Apr 2, 2026
to the GitHub Advisory Database
•
Updated Apr 4, 2026
Description
Published by the National Vulnerability Database
Apr 2, 2026
Published to the GitHub Advisory Database
Apr 2, 2026
Reviewed
Apr 4, 2026
Last updated
Apr 4, 2026
A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.
References