Redhat

Keycloak

185 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 30.04.2026 14:53:09
  • Zuletzt bearbeitet 05.05.2026 03:00:08

When Keycloak is started with `--features-disabled=account,account-api`, the Account REST API is only partially disabled. Five endpoints under the versioned path `/account/v1alpha1` remain fully functional — including both read and write operations —...

  • EPSS 0.06%
  • Veröffentlicht 14.04.2026 14:54:42
  • Zuletzt bearbeitet 17.04.2026 15:11:03

A flaw was found in Keycloak, specifically in the organization selection login page. A remote attacker with `manage-realm` or `manage-organizations` administrative privileges can exploit a Stored Cross-Site Scripting (XSS) vulnerability. This flaw oc...

  • EPSS 0.01%
  • Veröffentlicht 06.04.2026 08:38:36
  • Zuletzt bearbeitet 24.04.2026 15:39:21

A flaw was found in Keycloak. A remote attacker can exploit a Cross-Origin Resource Sharing (CORS) header injection vulnerability in Keycloak's User-Managed Access (UMA) token endpoint. This flaw occurs because the `azp` claim from a client-supplied ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 02.04.2026 12:45:01
  • Zuletzt bearbeitet 16.04.2026 20:50:00

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even ...

  • EPSS 0.08%
  • Veröffentlicht 02.04.2026 12:44:53
  • Zuletzt bearbeitet 16.04.2026 20:50:10

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource con...

  • EPSS 0.05%
  • Veröffentlicht 02.04.2026 12:44:52
  • Zuletzt bearbeitet 16.04.2026 20:52:33

A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an unauthenticated attacker to forge authorization codes. Successful exploitation can lead to th...

  • EPSS 0.04%
  • Veröffentlicht 02.04.2026 12:44:52
  • Zuletzt bearbeitet 16.04.2026 20:51:22

A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an attacker to delete arbitrary single-use entries, which can enable the replay of consumed acti...

  • EPSS 0.01%
  • Veröffentlicht 02.04.2026 12:37:30
  • Zuletzt bearbeitet 16.04.2026 20:52:42

A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft o...

  • EPSS 0.01%
  • Veröffentlicht 26.03.2026 19:13:26
  • Zuletzt bearbeitet 02.04.2026 14:16:31

A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over rol...

  • EPSS 0.03%
  • Veröffentlicht 26.03.2026 19:12:38
  • Zuletzt bearbeitet 02.04.2026 14:16:31

A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even...