CVE-2026-4874
LOW
NVD
CVSS Score
3.1
Severity
LOW
Published
Mar 26, 2026
Vendor
unknown
Description
A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak serverβs network context, potentially probing internal networks or internal APIs, leading to information disclosure.