Redhat

Keycloak

185 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.57%
  • Veröffentlicht 25.04.2024 16:15:10
  • Zuletzt bearbeitet 30.06.2025 13:49:15

A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "p...

  • EPSS 0.6%
  • Veröffentlicht 25.04.2024 16:15:09
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A log injection flaw was found in Keycloak. A text string may be injected through the authentication form when using the WebAuthn authentication mode. This issue may have a minor impact to the logs integrity.

  • EPSS 0.09%
  • Veröffentlicht 25.04.2024 13:15:50
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along w...

  • EPSS 0.23%
  • Veröffentlicht 17.04.2024 14:15:08
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the ...

  • EPSS 0.07%
  • Veröffentlicht 17.04.2024 14:15:08
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other ...

  • EPSS 0.33%
  • Veröffentlicht 17.04.2024 14:15:07
  • Zuletzt bearbeitet 30.06.2025 13:58:57

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain ...

  • EPSS 0.2%
  • Veröffentlicht 29.02.2024 01:43:54
  • Zuletzt bearbeitet 14.02.2025 17:24:40

A flaw was found in Keycloak. In certain conditions, this issue may allow a remote unauthenticated attacker to block other accounts from logging in.

  • EPSS 0.18%
  • Veröffentlicht 26.01.2024 15:15:08
  • Zuletzt bearbeitet 21.11.2024 08:43:32

A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate o...

  • EPSS 0.11%
  • Veröffentlicht 21.12.2023 10:15:34
  • Zuletzt bearbeitet 21.11.2024 07:58:52

Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malic...

  • EPSS 0.84%
  • Veröffentlicht 18.12.2023 23:15:10
  • Zuletzt bearbeitet 21.11.2024 08:44:51

A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-...