Keycloak: Application-Level DoS via Scope Processing
High severity
GitHub Reviewed
Published
Apr 2, 2026
to the GitHub Advisory Database
•
Updated Apr 4, 2026
Description
Published by the National Vulnerability Database
Apr 2, 2026
Published to the GitHub Advisory Database
Apr 2, 2026
Reviewed
Apr 4, 2026
Last updated
Apr 4, 2026
A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.
References