


Perceptive Security
SOC/SIEM Consultancy

OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.1, a user who has `write:admin` in one Keycloak realm can call the Manager API t…
Published:
21 April 2026 at 22:00:00
Alert date:
22 April 2026 at 22:11:22
Source:
nvd.nist.gov
Mobile & IoT, Identity & Access
OpenRemote IoT platform prior to version 1.22.1 contains a privilege escalation vulnerability in its Keycloak integration. A user with write:admin permissions in one Keycloak realm can exploit the Manager API to update realm roles for users in other realms, including the master realm. The vulnerability exists because the handler uses the realm path segment when communicating with the identity provider but fails to verify that the caller has administrative rights for that realm. This flaw allows attackers who control any user in the master realm to escalate privileges to master realm administrator. The issue has been resolved in version 1.22.1.
Technical details
Mitigation steps:
Affected products:
OpenRemote
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41166
https://github.com/openremote/openremote/releases/tag/1.22.1
https://github.com/openremote/openremote/security/advisories/GHSA-49vv-25qx-mg44
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
