CVE-2026-23552

Apache · Camel Keycloak

Apache Camel Keycloak fails to validate the issuer claim of JWT tokens, allowing tokens from one realm to be accepted by another, thereby breaking tenant isolation.

Executive summary

A critical authentication bypass in the Apache Camel Keycloak component allows attackers to use tokens from unauthorized realms to access protected resources, compromising multi-tenant security.

Vulnerability

The KeycloakSecurityPolicy does not validate the iss (issuer) claim of JWT tokens against the configured realm. This allows an authenticated user from one Keycloak realm to present a valid token to a policy configured for a different realm, which is then incorrectly accepted.

Business impact

This flaw completely breaks tenant isolation in multi-tenant environments. An attacker with access to any realm on a Keycloak server can gain unauthorized access to data and services in every other realm managed by the same Apache Camel policy. The CVSS score is 9.1.

Remediation

Immediate Action: Upgrade Apache Camel to version 4.18.0 or later to ensure that JWT issuer claims are properly validated against the configured realm.

Proactive Monitoring: Audit application logs for successful logins where the token's issuer does not match the expected tenant realm.

Compensating Controls: Implement manual issuer validation in application logic or use a gateway/proxy to verify the iss claim before traffic reaches the Camel component.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The failure to validate token issuers is a severe security gap. Organizations using Apache Camel with Keycloak must move to version 4.18.0 immediately to restore the security boundaries between their tenants.