CVE-2024-3656
- EPSS 89.11%
- Veröffentlicht 09.10.2024 19:15:13
- Zuletzt bearbeitet 23.12.2024 14:15:05
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breach...
CVE-2024-8698
- EPSS 78%
- Veröffentlicht 19.09.2024 16:15:06
- Zuletzt bearbeitet 12.12.2024 20:15:22
A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signatu...
CVE-2024-5967
- EPSS 0.14%
- Veröffentlicht 18.06.2024 12:15:12
- Zuletzt bearbeitet 21.11.2024 09:48:39
A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-r...
CVE-2024-4540
- EPSS 0.79%
- Veröffentlicht 03.06.2024 16:15:08
- Zuletzt bearbeitet 21.11.2024 09:43:04
A flaw was found in Keycloak in OAuth 2.0 Pushed Authorization Requests (PAR). Client-provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a `request_uri` authori...
- EPSS 0.09%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 21.11.2024 08:44:24
A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow...
CVE-2023-6544
- EPSS 0.39%
- Veröffentlicht 25.04.2024 16:15:10
- Zuletzt bearbeitet 21.11.2024 08:44:03
A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardiz...
CVE-2024-2419
- EPSS 0.07%
- Veröffentlicht 17.04.2024 14:15:08
- Zuletzt bearbeitet 21.11.2024 09:09:42
A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other ...
CVE-2024-1249
- EPSS 0.13%
- Veröffentlicht 17.04.2024 14:15:08
- Zuletzt bearbeitet 08.07.2025 14:15:24
A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the ...
CVE-2024-1132
- EPSS 0.24%
- Veröffentlicht 17.04.2024 14:15:07
- Zuletzt bearbeitet 30.06.2025 13:58:57
A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain ...
CVE-2017-12161
- EPSS 0.28%
- Veröffentlicht 21.02.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:08:57
It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, ...