Keycloak - Package Updates
-
[1.4.3]
- Update keycloak to 26.4.4
- Full Changelog
- #10388 Allow to hide client scopes from scopes_supported in discovery endpoint
- #43076 Add rate limiter for sending verification emails in context of update email
- #43509 Role authorization for workflows.
admin/api - #41270 Cannot save new attribute group
admin/ui - #41271 Changing user profile attribute results in an error everytime
admin/ui - #43082 ExternalLinksTest is broken due to missing path parameters
docs - #43091 Duplicate Email Fields on Temporarily Locked Out Sign In With Organization Identity-First Login
login/ui - #43160 Regression in DEBUG_PORT handling since 26.4.0 host binding (*:port / 0.0.0.0:port) no longer works
dist/quarkus - #43460 FGAP/UI:
reset-passwordsucceeds but UI shows 403 without Users:manageadmin/fine-grained-permissions - #43505 DPoP proof replay check doesn't consider clock skew
oidc
-
[1.4.4]
- Update keycloak to 26.4.5
- Full Changelog
- #43564 Invalid liquibase check sum for jpa-changelog-2.5.0.xml <code>core</code>
- #43718 Email Not Persisted During Registration When "Email as Username" is Enabled and User Edit Permission is Disabled <code>user-profile</code>
- #43793 import does not seem to run db migration <code>import-export</code>
- #43883 Creating group policy on a client uses "manage-clients" role if FGAP V1 is disabled <code>authorization-services</code>
- #44010 Ordering attributes will unset the unmanaged attribute policy <code>user-profile</code>
- #44031 Can't build keycloak 26.4.4 with quarkus.launch.rebuild=true <code>dist/quarkus</code>
- #44056 Allow only normalized URLs in requests caused a regression in view authz permission details in Admin Consol <code>admin/ui</code>
-
[1.4.5]
- Update keycloak to 26.4.6
- Full Changelog
- This release adds filtering of LDAP referrals by default.
- #43323 Sessions not removed when user is deleted infinispan
- #43738 UPDATE_EMAIL action invalidates old email login/ui
- #43812 Admin console sends non-JSON payload with content-type: application/json admin/ui
- #44125 Double-encoding of query parameter values (e.g. acr_values) for version 26.4 identity-brokering
- #44189 [jdbc-ping] SQLIntegrityConstraintViolationException: Duplicate entry infinispan
- #44229 Unexpected FORMAT_FAILURE error when using cache-config-file with feature-disabled=persistent-user-sessions infinispan
- #44269 Admin Client creates malformed paths for requests admin/client-js
- #44287 Caching of static theme resources in dev mode is disabled core
-
[1.4.6]
- Update keycloak to 26.4.7
- Full Changelog
- #43156 [Docs] Warn users about printing headers in HTTP access logs docs
- #43643 Upgrade to Quarkus 3.27.1 dist/quarkus
- #44438 Intermittent ConcurrentModificationException during SAML initialization causing status code 400 for clients saml
- #44480 Wrong persistent group permissions when multiple group membership changes happen in the same request core
-
[1.5.0]
- Update keycloak to 26.5.0
- Full Changelog
- Workflows to automate administrative tasks and process within a realm.
- JWT Authorization Grants, our recommended alternative to external to internal token exchange.
- Guide for using Keycloak as an authorization server for Model Context Protocol (MCP) servers.
- Authenticating clients with Kubernetes service account tokens to avoid static client secrets.
- OpenTelemetry support for metrics and logging, combining all observability information in this popular standard.
- CORS (Cross Origin Resource Sharing) is a browser security feature that controls how web pages on one domain can request resources from a different domain.
- For the OpenID Connect Dynamic Client Registration, you can now specify which CORS headers are allowed via the client registration access policies.
- For the overall CORS configuration, you can now allow environment specific headers to be allowed using the SPI option spi-cors--default--allowed-headers.
- The client logout configuration now includes an option to show a logout confirmation page. When enabled, users will see a You are logged out confirmation page upon successful logout.
- Previously, all scopes of an OpenID Connect client were advertised in the discovery endpoint.
-
[1.5.1]
- Update keycloak to 26.5.1
- Full Changelog
- #44863 x-robots HTTP header missing for static Keycloak resources, and REST endpoint responses
- #45009 Performance improvement: Missing indexes on BROKER_LINK table columns
- #45182 Allow full managing of realms from master realm without global admin role
- #43975 Test Framework -> Embedded server -> Maven execution failure: Failed to read script file from: scripts/default-policy.js <code>test-framework</code>
- #44371 403 Forbidden when assigning realm-management client roles despite FGAP disabled (regression in 26.4.0+) <code>admin/fine-grained-permissions</code>
- #44417 Security issue with Organization feature exposes and fills the account name automatically in user/password form <code>organizations</code>
- #44783 Create Realm button is missing when user has create-realm role <code>admin/ui</code>
- #44860 Admin UI: slow response time listing second user page <code>admin/ui</code>
- #45003 Bug in JWTClientAuthenticator and JWTClientSecretAuthenticator causes NPE <code>authentication</code>
- #45093 Enable visibility of Role Mapping tab for users with view-users role <code>admin/ui</code>
-
[1.5.2]
- Update keycloak to 26.5.2
- Full Changelog
- #44994 CVE-2025-67735 - netty-codec-http: Request Smuggling via CRLF Injection dependencies
- #43443 Keycloak should warn when ISPN or JGROUPS is running in debug level logging
- #45498 Ignore OpenAPI artifacts when disabled dist/quarkus
- #44785 Can not get through SSO login if using a custom attribute with default value user-profile
- #45015 Deadlock in Infinispan virtual threads infinispan
- #45250 IDToken contains duplicate address claims oidc
- #45333 User admin events don't show role, group mapping, reset password like events admin/ui
- #45396 Database Migration fails when updating to 26.5.0 on MS SQL core
- #45415 cache-remote-host becomes mandatory at build time when using clusterless feature infinispan
- #45417 Unmanaged Attributes Type (Only administrators can view) allows admin API to set Unmanaged Attributes user-profile
-
[1.5.3]
- Update keycloak to 26.5.3
- Full Changelog
- 46144 CVE-2026-1609 Disabled users can still obtain tokens via JWT Authorization Grant
- 46145 CVE-2026-1529 Forged invitation JWT enables cross-organization self-registration
- 46146 CVE-2026-1486 Logic Bypass in JWT Authorization Grant Allows Authentication via Disabled Identity Providers
- 46147 CVE-2025-14778 Incorrect ownership checks in /uma-policy/
- 45892 Upgrade minikube for CI tests
operator - 44379 Node.js admin client does not refresh tokens
admin/client-js - 45459 k8s multiple restart (oomkilled) in v26.5.0-0 during startup because of RAM
dist/quarkus - 45662 Increase in startup memory consumption in post 26.5 versions
dist/quarkus - 45677 Hibernate Validator is enabled by default when not used
dist/quarkus - 45708 Unpexted value '' in mixed-cluster-compatibility-tests
testsuite
-
[1.5.4]
- Update keycloak to 26.5.4
- Full Changelog
- CVE-2026-1190 - Keycloak SAML brokering: Response delay due to unchecked NotOnOrAfter in SubjectConfirmationData saml
- CVE-2026-0707: Keycloak Authorization Header Parsing Leading to Potential Security Control Bypass
- CVE-2025-5416 keycloak-core: Keycloak Environment Information
- CVE-2026-2575 - Denial of Service due to excessive SAMLRequest decompression saml
- CVE-2026-2733 Missing Check on Disabled Client for Docker Registry Protocol
- New key affinity for session ids
- "Update email" AIA: "Back to Application" URL invokes OIDC callback with missing parameters oidc
- Client deletion timeout due to large number of client roles storage
- auth_mellon (SAML) authentication fails after upgrade to 26.5.1 (from 26.4.6) saml
- Information Disclosure of Client Secret on Unauthenticated Config Endpoint oidc
-
[1.5.5]
- Update keycloak to 26.5.5
- Full Changelog
- <a href="https://github.com/keycloak/keycloak/issues/46909">#46909</a> CVE-2026-3047 SAML broker: Authentication bypass due to disabled SAML client completing IdP-initiated login </li>
- <a href="https://github.com/keycloak/keycloak/issues/46910">#46910</a> CVE-2026-3009 Improper Enforcement of Disabled Identity Provider in IdentityBrokerService </li>
- <a href="https://github.com/keycloak/keycloak/issues/46911">#46911</a> CVE-2026-2603 Disabled SAML IdP still allows IdP-initiated broker login </li>
- <a href="https://github.com/keycloak/keycloak/issues/46912">#46912</a> CVE-2026-2092 saml broker encrypted assertion injection </li>
Hello! It looks like you're interested in this conversation, but you don't have an account yet.
Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.
With your input, this post could be even better 💗
Register Login