A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.
{
"nvd_published_at": "2026-04-02T13:16:27Z",
"severity": "HIGH",
"github_reviewed_at": "2026-04-04T06:00:47Z",
"cwe_ids": [
"CWE-1050"
],
"github_reviewed": true
}