A flaw was found in Keycloak. The cross-session verification proof is keyed only by (local userId,
idpAlias) and is not bound to the upstream identity that was actually verified, so a second upstream account on the same IdP can consume it and get linked to the victim's local account.
Metrics
Affected Vendors & Products
References
History
Wed, 20 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat build Of Keycloak
|
|
| Vendors & Products |
Redhat build Of Keycloak
|
Wed, 20 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. The cross-session verification proof is keyed only by (local userId, idpAlias) and is not bound to the upstream identity that was actually verified, so a second upstream account on the same IdP can consume it and get linked to the victim's local account. | |
| Title | Keycloak: cross-session email verification proof not bound to upstream identity in first-broker-login | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2026-05-20T16:13:03.022Z
Updated: 2026-05-20T16:13:03.022Z
Reserved: 2026-05-20T14:53:18.352Z
Link: CVE-2026-9087
No data.
Status : Awaiting Analysis
Published: 2026-05-20T17:16:32.207
Modified: 2026-05-20T17:32:35.827
Link: CVE-2026-9087
No data.