Redhat

Keycloak

185 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.45%
  • Veröffentlicht 05.03.2026 18:28:36
  • Zuletzt bearbeitet 26.03.2026 14:20:02

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 18:27:43
  • Zuletzt bearbeitet 24.03.2026 12:16:12

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a prev...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2026 08:10:15
  • Zuletzt bearbeitet 05.03.2026 02:19:42

A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none"...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2026 07:30:26
  • Zuletzt bearbeitet 05.03.2026 02:03:32

A flaw was found in Keycloak. An administrator with `manage-users` permission can bypass the "Only administrators can view" setting for unmanaged attributes, allowing them to modify these attributes. This improper access control can lead to unauthori...

  • EPSS 0.03%
  • Veröffentlicht 19.02.2026 07:48:08
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does no...

  • EPSS 0.01%
  • Veröffentlicht 10.02.2026 11:16:09
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in Keycloak. When the logging format is configured to a verbose, user-supplied pattern (such as the pre-defined 'long' pattern), sensitive headers including Authorization and Cookie are disclosed to the logs in cleartext. An attacker...

  • EPSS 0.01%
  • Veröffentlicht 09.02.2026 18:58:29
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only v...

  • EPSS 0.01%
  • Veröffentlicht 09.02.2026 18:36:15
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in Keycloak. An attacker can exploit this vulnerability by modifying the organization ID and target email within a legitimate invitation token's JSON Web Token (JWT) payload. This lack of cryptographic signature verification allows t...

  • EPSS 0.03%
  • Veröffentlicht 09.02.2026 18:36:10
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in Keycloak. A vulnerability exists in the jwt-authorization-grant flow where the server fails to verify if an Identity Provider (IdP) is enabled before issuing tokens. The issuer lookup mechanism (lookupIdentityProviderFromIssuer) r...

  • EPSS 0.01%
  • Veröffentlicht 02.02.2026 07:17:46
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in Keycloak’s CIBA feature where insufficient validation of client-configured backchannel notification endpoints could allow blind server-side requests to internal services.