CVE-2026-23552 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: February 23, 2026
Apache Camel Keycloak - Broken Access Control
Overview
Apache Camel Keycloak component 4.15.0 to <4.18.0 contains a broken access control caused by lack of issuer claim validation in KeycloakSecurityPolicy, letting attackers bypass tenant isolation by using tokens from other realms, exploit requires crafted JWT tokens.
Severity & Score
Impact
Attackers can bypass tenant isolation, potentially accessing or manipulating data across different realms.
Mitigation
Upgrade to version 4.18.0.
References
Social Media Activity(2 posts)
šØ CRITICAL: CVE-2026-23552 in Apache Camel 4.15.0 ā 4.17.x breaks tenant isolation ā JWT tokens from any Keycloak realm may be accepted! Upgrade to 4.18.0 ASAP to secure multi-tenant systems. https://radar.offseq.com/threat/cve-2026-23552-cwe-346-origin-validation-error-in--099c72c7 #OffSeq #ApacheCamel #Vuln #Keycloak
View original postš“ CVE-2026-23552 - Critical (9.1) Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycloak component. The Camel-Keycloak KeycloakSecurityPolicy does not validate the iss (issuer) claim of JWT tokens against the configured realm. A token issued by one ... š https://www.thehackerwire.com/vulnerability/CVE-2026-23552/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-23552
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- broken_access_control
- Status
- unconfirmed
- EPSS
- 1.5%
- Social Posts
- 2
CWE
- CWE-346
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N