A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an attacker to delete arbitrary single-use entries, which can enable the replay of consumed action tokens, such as password reset links. This could lead to unauthorized access or account compromise.
{
"github_reviewed_at": "2026-04-04T05:58:45Z",
"nvd_published_at": "2026-04-02T13:16:26Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-653"
],
"github_reviewed": true
}