Synopsis
The remote host is affected by multiple vulnerabilities.
Description
Keycloak versions installed prior to 26.5.3 are affected by multiple vulnerabilities as referenced in the advisory.
- A flaw in Keycloak where the JSON Web Token (JWT) authorization grant preview feature fails to validate a user's disabled status during JWT authorization grant processing. When this feature is enabled, disabled user accounts can still be used to obtain valid JWTs. (CVE-2026-1609)
- An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access. (CVE-2026-1529)
- A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer) retrieves the IdP configuration but does not filter for isEnabled=false. If an administrator disables an IdP (e.g., due to a compromise or offboarding), an entity possessing that IdP's signing key can still generate valid JWT assertions that Keycloak accepts, resulting in the issuance of valid access tokens. (CVE-2026-1486)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade Keycloak to 26.5.3 or later.
Plugin Details
File Name: keycloak_26_5_3.nasl
Agent: unix
Configuration: Enable thorough checks (optional)
Supported Sensors: Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Information
CPE: cpe:/a:keycloak:keycloak
Required KB Items: Host/local_checks_enabled, Host/uname
Exploit Ease: No known exploits are available
Patch Publication Date: 2/9/2026
Vulnerability Publication Date: 2/9/2026