Keycloak

Keycloak

32 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 25.11.2025 16:02:21
  • Zuletzt bearbeitet 23.12.2025 21:15:47

A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.

  • EPSS 0.02%
  • Veröffentlicht 13.11.2025 16:47:53
  • Zuletzt bearbeitet 19.12.2025 21:15:53

A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local ...

  • EPSS 0.02%
  • Veröffentlicht 28.10.2025 13:23:34
  • Zuletzt bearbeitet 19.12.2025 20:15:49

A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another user's session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly dur...

  • EPSS 0.02%
  • Veröffentlicht 28.10.2025 03:08:30
  • Zuletzt bearbeitet 19.12.2025 21:15:53

A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to acc...

  • EPSS 0.05%
  • Veröffentlicht 23.10.2025 14:19:24
  • Zuletzt bearbeitet 19.12.2025 22:15:51

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation w...

  • EPSS 0.05%
  • Veröffentlicht 23.10.2025 14:15:35
  • Zuletzt bearbeitet 19.12.2025 20:15:48

A flaw was found in Keycloak. Keycloak does not immediately enforce the disabling of the "Remember Me" realm setting on existing user sessions. Sessions created while "Remember Me" was active retain their extended session lifetime until they expire, ...

  • EPSS 0.03%
  • Veröffentlicht 05.09.2025 19:59:04
  • Zuletzt bearbeitet 19.12.2025 22:15:50

A flaw was found in Keycloak. Keycloak’s account console and other pages accept arbitrary text in the error_description query parameter. This text is directly rendered in error pages without validation or sanitization. While HTML encoding prevents XS...

  • EPSS 0.02%
  • Veröffentlicht 21.08.2025 15:40:25
  • Zuletzt bearbeitet 22.09.2025 16:15:46

A flaw was found in org.keycloak/keycloak-model-storage-service. The KeycloakRealmImport custom resource substitutes placeholders within imported realm documents, potentially referencing environment variables. This substitution process allows for inj...

  • EPSS 0.08%
  • Veröffentlicht 09.06.2025 12:41:51
  • Zuletzt bearbeitet 12.06.2025 16:06:47

Wasp (Web Application Specification) is a Rails-like framework for React, Node.js, and Prisma. Prior to version 0.16.6, Wasp authentication has a vulnerability in the OAuth authentication implementation (affecting only Keycloak with a specific config...

  • EPSS 0.19%
  • Veröffentlicht 18.02.2025 18:15:25
  • Zuletzt bearbeitet 18.02.2025 18:15:25

A vulnerability was found in Keycloak. This issue may allow a privileged attacker to use a malicious payload as the permission while creating items (Resource and Permissions) from the admin console, leading to a stored cross-site scripting (XSS) atta...