A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access.
{
"github_reviewed": true,
"github_reviewed_at": "2026-02-10T18:35:20Z",
"severity": "HIGH",
"nvd_published_at": "2026-02-09T20:15:55Z",
"cwe_ids": [
"CWE-347"
]
}