Redhat

Keycloak

148 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 02.02.2026 07:17:46
  • Zuletzt bearbeitet 03.02.2026 16:44:36

A flaw was found in Keycloak’s CIBA feature where insufficient validation of client-configured backchannel notification endpoints could allow blind server-side requests to internal services.

  • EPSS 0.02%
  • Veröffentlicht 02.02.2026 05:43:22
  • Zuletzt bearbeitet 03.02.2026 16:44:36

A flaw was found in Keycloak Admin API. This vulnerability allows an administrator with limited privileges to retrieve sensitive custom attributes via the /unmanagedAttributes endpoint, bypassing User Profile visibility settings.

  • EPSS 0.27%
  • Veröffentlicht 30.01.2026 14:25:54
  • Zuletzt bearbeitet 30.01.2026 15:16:07

A flaw was found in Undertow. Servlets using a method that calls HttpServletRequestImpl.getParameterNames() can cause an OutOfMemoryError when the client sends a request with large parameter names. This issue can be exploited by an unauthorized user ...

  • EPSS 0.05%
  • Veröffentlicht 26.01.2026 19:36:53
  • Zuletzt bearbeitet 27.01.2026 14:59:34

A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This al...

  • EPSS 0.03%
  • Veröffentlicht 21.01.2026 12:04:12
  • Zuletzt bearbeitet 26.01.2026 15:04:59

A flaw was found in the Keycloak Admin REST API. This vulnerability allows the exposure of backend schema and rules, potentially leading to targeted attacks or privilege escalation via improper access control.

  • EPSS 0.04%
  • Veröffentlicht 21.01.2026 06:13:31
  • Zuletzt bearbeitet 26.01.2026 15:04:59

A flaw was found in the keycloak-services component of Keycloak. This vulnerability allows the issuance of access and refresh tokens for disabled users, leading to unauthorized use of previously revoked privileges, via a business logic vulnerability ...

  • EPSS 0.03%
  • Veröffentlicht 21.01.2026 05:52:22
  • Zuletzt bearbeitet 26.01.2026 15:04:59

A flaw was found in the Keycloak server during refresh token processing, specifically in the TokenManager class responsible for enforcing refresh token reuse policies. When strict refresh token rotation is enabled, the validation and update of refres...

  • EPSS 0.04%
  • Veröffentlicht 20.01.2026 12:33:00
  • Zuletzt bearbeitet 26.01.2026 15:05:23

A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the d...

  • EPSS 0.04%
  • Veröffentlicht 15.01.2026 12:06:21
  • Zuletzt bearbeitet 16.01.2026 15:55:33

A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker...

  • EPSS 0.07%
  • Veröffentlicht 08.01.2026 03:41:27
  • Zuletzt bearbeitet 08.01.2026 18:08:18

A flaw was found in Keycloak. The Keycloak Authorization header parser is overly permissive regarding the formatting of the "Bearer" authentication scheme. It accepts non-standard characters (such as tabs) as separators and tolerates case variations ...