Redhat

Build Of Keycloak

30 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Veröffentlicht 23.03.2026 10:53:35
  • Zuletzt bearbeitet 01.04.2026 14:26:47

A flaw was found in Keycloak. A remote attacker can exploit differential error messages during the identity-first login flow when Organizations are enabled. This vulnerability allows an attacker to determine the existence of users, leading to informa...

  • EPSS 0.03%
  • Veröffentlicht 23.03.2026 08:09:22
  • Zuletzt bearbeitet 01.04.2026 14:29:05

A flaw was found in Keycloak. An improper Access Control vulnerability in Keycloak’s User-Managed Access (UMA) resource_set endpoint allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false restriction. This occurs du...

  • EPSS 0.03%
  • Veröffentlicht 18.03.2026 04:02:59
  • Zuletzt bearbeitet 01.04.2026 15:10:12

A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintend...

  • EPSS 0.01%
  • Veröffentlicht 11.03.2026 05:36:43
  • Zuletzt bearbeitet 07.05.2026 18:30:50

A flaw was found in Keycloak. An authenticated user with the view-users role could exploit a vulnerability in the UserResource component. By accessing a specific administrative endpoint, this user could improperly retrieve user attributes that were c...

  • EPSS 0.45%
  • Veröffentlicht 05.03.2026 18:28:36
  • Zuletzt bearbeitet 26.03.2026 14:20:02

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 18:27:43
  • Zuletzt bearbeitet 24.03.2026 12:16:12

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a prev...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2026 08:10:15
  • Zuletzt bearbeitet 05.03.2026 02:19:42

A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none"...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2026 07:30:26
  • Zuletzt bearbeitet 05.03.2026 02:03:32

A flaw was found in Keycloak. An administrator with `manage-users` permission can bypass the "Only administrators can view" setting for unmanaged attributes, allowing them to modify these attributes. This improper access control can lead to unauthori...

  • EPSS 0.09%
  • Veröffentlicht 18.07.2025 13:48:45
  • Zuletzt bearbeitet 06.05.2026 17:16:19

A flaw was found in the Keycloak identity and access management system when Fine-Grained Admin Permissions(FGAPv2) are enabled. An administrative user with the manage-users role can escalate their privileges to realm-admin due to improper privilege e...

  • EPSS 0.07%
  • Veröffentlicht 29.04.2025 20:46:39
  • Zuletzt bearbeitet 18.08.2025 15:55:00

A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication.