{
  "threat_severity" : "Moderate",
  "public_date" : "2026-04-02T12:30:00Z",
  "bugzilla" : {
    "description" : "keycloak: Keycloak: Replay of action tokens via improper handling of single-use entries",
    "id" : "2448351",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2448351"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-653",
  "details" : [ "A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an attacker to delete arbitrary single-use entries, which can enable the replay of consumed action tokens, such as password reset links. This could lead to unauthorized access or account compromise.", "A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an attacker to delete arbitrary single-use entries, which can enable the replay of consumed action tokens, such as password reset links. This could lead to unauthorized access or account compromise." ],
  "statement" : "This flaw in Keycloak's SingleUseObjectProvider has a MODERATE impact. It allows an attacker to delete arbitrary single-use entries, which could lead to the replay of consumed action tokens such as password reset links. Exploitation requires high attack complexity and user interaction.",
  "acknowledgement" : "Red Hat would like to thank chungkn (OneMount Group) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6476",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.2.15-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6476",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9:26.2-18"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6476",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.2-18"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2.15",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6475",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6478",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.4.11-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6478",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9:26.4-14"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6478",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.4-14"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4.11",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6477",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-4325\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-4325" ],
  "name" : "CVE-2026-4325",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}