Redhat

Build Of Keycloak

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 18:27:43
  • Zuletzt bearbeitet 10.03.2026 17:04:17

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a prev...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2026 08:10:15
  • Zuletzt bearbeitet 05.03.2026 02:19:42

A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none"...

  • EPSS 0.03%
  • Veröffentlicht 27.02.2026 07:30:26
  • Zuletzt bearbeitet 05.03.2026 02:03:32

A flaw was found in Keycloak. An administrator with `manage-users` permission can bypass the "Only administrators can view" setting for unmanaged attributes, allowing them to modify these attributes. This improper access control can lead to unauthori...

  • EPSS 0.02%
  • Veröffentlicht 18.07.2025 13:48:45
  • Zuletzt bearbeitet 11.08.2025 19:16:40

A flaw was found in the Keycloak identity and access management system when Fine-Grained Admin Permissions(FGAPv2) are enabled. An administrative user with the manage-users role can escalate their privileges to realm-admin due to improper privilege e...

  • EPSS 0.07%
  • Veröffentlicht 29.04.2025 20:46:39
  • Zuletzt bearbeitet 18.08.2025 15:55:00

A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication.

  • EPSS 0.56%
  • Veröffentlicht 22.10.2024 14:15:14
  • Zuletzt bearbeitet 23.07.2025 19:15:31

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior aga...

  • EPSS 89.66%
  • Veröffentlicht 09.10.2024 19:15:13
  • Zuletzt bearbeitet 23.12.2024 14:15:05

A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breach...

  • EPSS 5.11%
  • Veröffentlicht 19.09.2024 16:15:06
  • Zuletzt bearbeitet 26.11.2024 19:15:32

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes...

  • EPSS 0.37%
  • Veröffentlicht 09.09.2024 19:15:14
  • Zuletzt bearbeitet 01.10.2024 14:15:06

An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into b...

  • EPSS 1.39%
  • Veröffentlicht 09.09.2024 19:15:14
  • Zuletzt bearbeitet 07.10.2024 20:15:17

A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additiona...