It was found that Keycloak’s SAML broker did not verify missing message signatures. If an attacker modifies the SAML Response and removes the sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.
Administrator can prevent this issue for POST binding by requiring signed assertions.