CVE-2026-8922

MEDIUMNVD 5.45.4
EchelonGraph scoreHIGH confidence

Score 5.4 from GitHub Security Advisory published 2026-05-19. NVD baseline CVSS 5.4; sources differ by 0.0.

Triggered by: GitHub Security Advisory CVSS
Sources: epss, ghsa, nvd
5.4

A flaw was found in Keycloak. When both realm-level and client-level notBefore revocation policies are configured, Keycloak's OpenID Connect (OIDC) Introspection feature fails to properly honor the realm-level policy. This allows tokens that should have been revoked to remain active, potentially leading to unauthorized access or continued session validity. This could impact the security of systems utilizing Keycloak for identity and access management.

CVSS v3
5.4
EG Score
5.4(high)
EPSS
1.2%
KEV
Not listed

Published

May 19, 2026

Last Modified

May 19, 2026

Frequently asked(5)

What is CVE-2026-8922?
CVE-2026-8922 is a medium vulnerability published on May 19, 2026. A flaw was found in Keycloak. When both realm-level and client-level notBefore revocation policies are configured, Keycloak's OpenID Connect (OIDC) Introspection feature fails to properly honor the realm-level policy. This allows tokens that should have been revoked to remain active, potentially…
When was CVE-2026-8922 disclosed?
CVE-2026-8922 was first published in the National Vulnerability Database on May 19, 2026. EchelonGraph re-ingests CVE updates from NVD on a 2-hour cycle, so this page reflects the latest published state.
Is CVE-2026-8922 actively exploited?
CVE-2026-8922 is not currently on CISA's Known Exploited Vulnerabilities catalog. FIRST EPSS estimates a 1.2% percentile likelihood of exploitation in the next 30 days — higher percentiles indicate greater predicted risk.
What is the CVSS score of CVE-2026-8922?
CVE-2026-8922 has a CVSS v3 base score of 5.4 (NVD).
How do I remediate CVE-2026-8922?
Patch to the fixed version published by the affected vendor. Where vendor advisories exist for CVE-2026-8922, EchelonGraph cross-links them in the Vendor Advisories panel below — those typically contain the canonical remediation steps, fixed version numbers, and any vendor-specific mitigations.

Dependency Blast Radius

See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-8922

Explore →

Is Your Infrastructure Affected by CVE-2026-8922?

EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.