A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure. |
| Title | keycloak: Keycloak: Information Disclosure via improper role enforcement in UMA 2.0 Protection API | Keycloak: keycloak: information disclosure via improper role enforcement in uma 2.0 protection api |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keycloak
Keycloak keycloak |
|
| Vendors & Products |
Keycloak
Keycloak keycloak |
Wed, 25 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | keycloak: Keycloak: Information Disclosure via improper role enforcement in UMA 2.0 Protection API | |
| Weaknesses | CWE-280 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-26T19:12:38.438Z
Reserved: 2026-02-25T08:35:07.988Z
Link: CVE-2026-3190
No data.
Status : Received
Published: 2026-03-26T19:17:06.413
Modified: 2026-03-26T19:17:06.413
Link: CVE-2026-3190