The vulnerability CVE-2026-1518 is a Server-Side Request Forgery (SSRF) in Keycloak's CIBA implementation. The root cause is the insufficient validation of the backchannel_client_notification_endpoint provided by a client. When a CIBA flow is initiated, Keycloak sends a POST request to this endpoint. Without proper validation, an attacker can set this endpoint to an internal address, causing Keycloak to make a request to an internal service.
Although no specific patch was found, the vulnerability description allows for a logical deduction of the vulnerable function. The Keycloak component responsible for sending CIBA backchannel notifications via HTTP is the HttpAuthenticationChannel class. A method within this class, likely named request or similar, would be responsible for creating and sending the HTTP request. This method would be the entry point for the SSRF attack, as it would consume the malicious URL. Therefore, org.keycloak.protocol.oidc.grants.ciba.channel.HttpAuthenticationChannel.request is identified as the vulnerable function. The confidence is medium as this is based on deduction from the vulnerability description rather than analysis of a specific code change.