Redhat

Keycloak

148 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.2%
  • Veröffentlicht 23.12.2025 20:42:38
  • Zuletzt bearbeitet 29.12.2025 15:58:56

A flaw was found in Keycloak. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) by repeatedly initiating TLS 1.2 client-initiated renegotiation requests to exhaust server CPU resources, making the service...

  • EPSS 0.04%
  • Veröffentlicht 16.12.2025 05:16:11
  • Zuletzt bearbeitet 16.12.2025 14:10:11

A flaw was found in Keycloak. An IDOR (Broken Access Control) vulnerability exists in the admin API endpoints for authorization resource management, specifically in ResourceSetService and PermissionTicketService. The system checks authorization again...

  • EPSS 0.03%
  • Veröffentlicht 10.12.2025 09:15:46
  • Zuletzt bearbeitet 12.12.2025 15:18:42

A flaw was found in Keycloak Admin REST (Representational State Transfer) API. This vulnerability allows information disclosure of sensitive role metadata via insufficient authorization checks on the /admin/realms/{realm}/roles endpoint.

  • EPSS 0.46%
  • Veröffentlicht 03.12.2025 18:40:25
  • Zuletzt bearbeitet 26.01.2026 23:15:54

A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method ...

  • EPSS 0.02%
  • Veröffentlicht 25.11.2025 16:02:21
  • Zuletzt bearbeitet 23.12.2025 21:15:47

A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.

  • EPSS 0.02%
  • Veröffentlicht 13.11.2025 16:47:53
  • Zuletzt bearbeitet 19.12.2025 21:15:53

A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local ...

  • EPSS 0.02%
  • Veröffentlicht 28.10.2025 13:23:34
  • Zuletzt bearbeitet 19.12.2025 20:15:49

A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another user's session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly dur...

  • EPSS 0.02%
  • Veröffentlicht 28.10.2025 03:08:30
  • Zuletzt bearbeitet 19.12.2025 21:15:53

A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to acc...

  • EPSS 0.05%
  • Veröffentlicht 23.10.2025 14:19:24
  • Zuletzt bearbeitet 19.12.2025 22:15:51

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation w...

  • EPSS 0.05%
  • Veröffentlicht 23.10.2025 14:15:35
  • Zuletzt bearbeitet 19.12.2025 20:15:48

A flaw was found in Keycloak. Keycloak does not immediately enforce the disabling of the "Remember Me" realm setting on existing user sessions. Sessions created while "Remember Me" was active retain their extended session lifetime until they expire, ...