CVE-2026-1529
A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://nvd.nist.gov/vuln/detail/CVE-2026-1529, https://github.com/keycloak/keycloak/issues/46145, https://github.com/keycloak/keycloak/pull/46155, https://github.com/keycloak/keycloak/commit/82cd7941d1dd28fa14a67a6e6b912301f1a5e1a1, https://github.com/keycloak/keycloak/commit/8fc9a98026106a326f4faa98d4c9a48341ace2d7, https://github.com/keycloak/keycloak/commit/b2519756487b519f95c07aa8b10afe003e492119, https://access.redhat.com/errata/RHSA-2026:2363, https://access.redhat.com/errata/RHSA-2026:2364, https://access.redhat.com/errata/RHSA-2026:2365, https://access.redhat.com/errata/RHSA-2026:2366, https://access.redhat.com/security/cve/CVE-2026-1529, https://bugzilla.redhat.com/show_bug.cgi?id=2433783, https://github.com/keycloak/keycloak
