Keycloak SAML XML DoS: Unauth Remote Attacker via Crafted Input
CVE-2026-7307 Published on May 19, 2026
Keycloak: keycloak: denial of service via specially crafted saml input
A flaw was found in Keycloak. A remote, unauthenticated attacker can send a specially crafted XML input to the Security Assertion Markup Language (SAML) endpoint. This malicious input can cause high CPU usage and worker thread starvation, leading to a Denial of Service (DoS) where the server becomes unavailable.
Vulnerability Analysis
CVE-2026-7307 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Timeline
Reported to Red Hat.
Made public. 7 days later.
Weakness Type
Improper Validation of Syntactic Correctness of Input
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.
Products Associated with CVE-2026-7307
Want to know whenever a new CVE is published for Red Hat Build Keycloak? stack.watch will email you.
Affected Versions
Red Hat build of Keycloak 26.2:- Version 26.2.16-1 and below * is unaffected.
- Version 26.2-21 and below * is unaffected.
- Version 26.2-21 and below * is unaffected.
- Version 26.4.12-1 and below * is unaffected.
- Version 26.4-17 and below * is unaffected.
- Version 26.4-17 and below * is unaffected.