CVE-2025-1391
- EPSS 0.04%
- Veröffentlicht 17.02.2025 14:15:08
- Zuletzt bearbeitet 10.03.2025 19:15:39
A flaw was found in the Keycloak organization feature, which allows the incorrect assignment of an organization to a user if their username or email matches the organization’s domain pattern. This issue occurs at the mapper level, leading to misrepre...
CVE-2025-0604
- EPSS 0.06%
- Veröffentlicht 22.01.2025 15:15:14
- Zuletzt bearbeitet 10.03.2025 19:15:39
A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disa...
CVE-2024-11736
- EPSS 0.02%
- Veröffentlicht 14.01.2025 09:15:20
- Zuletzt bearbeitet 14.01.2025 09:15:20
A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeho...
CVE-2024-11734
- EPSS 0.05%
- Veröffentlicht 14.01.2025 09:15:19
- Zuletzt bearbeitet 14.01.2025 09:15:19
A denial of service vulnerability was found in Keycloak that could allow an administrative user with the right to change realm settings to disrupt the service. This action is done by modifying any of the security headers and inserting newlines, which...
CVE-2024-10973
- EPSS 0.02%
- Veröffentlicht 17.12.2024 23:15:05
- Zuletzt bearbeitet 17.12.2024 23:15:05
A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks relat...
CVE-2024-9666
- EPSS 0.01%
- Veröffentlicht 25.11.2024 08:15:10
- Zuletzt bearbeitet 25.11.2024 08:15:10
A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP valu...
CVE-2024-10492
- EPSS 0.08%
- Veröffentlicht 25.11.2024 08:15:08
- Zuletzt bearbeitet 25.11.2024 08:15:08
A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform res...
CVE-2024-10270
- EPSS 0.09%
- Veröffentlicht 25.11.2024 08:15:03
- Zuletzt bearbeitet 25.11.2024 08:15:03
A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.
CVE-2024-3656
- EPSS 89.49%
- Veröffentlicht 09.10.2024 19:15:13
- Zuletzt bearbeitet 23.12.2024 14:15:05
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breach...
CVE-2024-8698
- EPSS 79.16%
- Veröffentlicht 19.09.2024 16:15:06
- Zuletzt bearbeitet 12.12.2024 20:15:22
A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signatu...