Redhat

Keycloak

128 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 04.03.2025 16:15:39
  • Zuletzt bearbeitet 31.05.2025 19:15:20

A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI.

  • EPSS 0.1%
  • Veröffentlicht 18.02.2025 18:15:25
  • Zuletzt bearbeitet 18.02.2025 18:15:25

A vulnerability was found in Keycloak. This issue may allow a privileged attacker to use a malicious payload as the permission while creating items (Resource and Permissions) from the admin console, leading to a stored cross-site scripting (XSS) atta...

  • EPSS 0.02%
  • Veröffentlicht 17.02.2025 14:15:08
  • Zuletzt bearbeitet 10.03.2025 19:15:39

A flaw was found in the Keycloak organization feature, which allows the incorrect assignment of an organization to a user if their username or email matches the organization’s domain pattern. This issue occurs at the mapper level, leading to misrepre...

  • EPSS 0.09%
  • Veröffentlicht 30.01.2025 15:15:18
  • Zuletzt bearbeitet 22.07.2025 09:15:23

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resum...

  • EPSS 0.05%
  • Veröffentlicht 22.01.2025 15:15:14
  • Zuletzt bearbeitet 10.03.2025 19:15:39

A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disa...

  • EPSS 0.02%
  • Veröffentlicht 14.01.2025 09:15:20
  • Zuletzt bearbeitet 14.01.2025 09:15:20

A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeho...

  • EPSS 0.06%
  • Veröffentlicht 14.01.2025 09:15:19
  • Zuletzt bearbeitet 14.01.2025 09:15:19

A denial of service vulnerability was found in Keycloak that could allow an administrative user with the right to change realm settings to disrupt the service. This action is done by modifying any of the security headers and inserting newlines, which...

  • EPSS 0.02%
  • Veröffentlicht 17.12.2024 23:15:05
  • Zuletzt bearbeitet 17.12.2024 23:15:05

A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks relat...

  • EPSS 0.38%
  • Veröffentlicht 12.12.2024 09:15:05
  • Zuletzt bearbeitet 10.06.2025 11:15:21

A flaw was found in Quarkus-HTTP, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary a...

  • EPSS 0.14%
  • Veröffentlicht 09.12.2024 21:15:08
  • Zuletzt bearbeitet 02.10.2025 12:15:28

A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorizat...