Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/keycloak@12.0.2-1
Typealpm
Namespacearchlinux
Namekeycloak
Version12.0.2-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.0.3-1
Latest_non_vulnerable_version16.0.0-1
Affected_by_vulnerabilities
0
url VCID-5apu-r7pn-byet
vulnerability_id VCID-5apu-r7pn-byet
summary
keycloak Self Stored Cross-site Scripting vulnerability
A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20195.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20195
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53697
published_at 2026-04-29T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53763
published_at 2026-04-11T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53746
published_at 2026-04-12T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53729
published_at 2026-04-13T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53767
published_at 2026-04-16T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.53772
published_at 2026-04-18T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53753
published_at 2026-04-21T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53718
published_at 2026-04-24T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.5373
published_at 2026-04-26T12:55:00Z
9
value 0.00305
scoring_system epss
scoring_elements 0.53648
published_at 2026-04-01T12:55:00Z
10
value 0.00305
scoring_system epss
scoring_elements 0.53669
published_at 2026-04-02T12:55:00Z
11
value 0.00305
scoring_system epss
scoring_elements 0.53696
published_at 2026-04-04T12:55:00Z
12
value 0.00305
scoring_system epss
scoring_elements 0.53664
published_at 2026-04-07T12:55:00Z
13
value 0.00305
scoring_system epss
scoring_elements 0.53717
published_at 2026-04-08T12:55:00Z
14
value 0.00305
scoring_system epss
scoring_elements 0.53715
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20195
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919143
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1919143
3
reference_url https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-20195
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-20195
5
reference_url https://security.archlinux.org/ASA-202102-29
reference_id ASA-202102-29
reference_type
scores
url https://security.archlinux.org/ASA-202102-29
6
reference_url https://security.archlinux.org/AVG-1578
reference_id AVG-1578
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1578
7
reference_url https://github.com/advisories/GHSA-q6w2-89hq-hq27
reference_id GHSA-q6w2-89hq-hq27
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q6w2-89hq-hq27
fixed_packages
0
url pkg:alpm/archlinux/keycloak@12.0.3-1
purl pkg:alpm/archlinux/keycloak@12.0.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@12.0.3-1
aliases CVE-2021-20195, GHSA-q6w2-89hq-hq27
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5apu-r7pn-byet
Fixing_vulnerabilities
0
url VCID-6s4w-hv7a-ffaw
vulnerability_id VCID-6s4w-hv7a-ffaw
summary
Keycloak vulnerable to Server-Side Request Forgery
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter `request_uri`. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
references
0
reference_url http://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10770.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10770.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10770
reference_id
reference_type
scores
0
value 0.92282
scoring_system epss
scoring_elements 0.99725
published_at 2026-04-26T12:55:00Z
1
value 0.92282
scoring_system epss
scoring_elements 0.99724
published_at 2026-04-24T12:55:00Z
2
value 0.92282
scoring_system epss
scoring_elements 0.99723
published_at 2026-04-21T12:55:00Z
3
value 0.92282
scoring_system epss
scoring_elements 0.9972
published_at 2026-04-18T12:55:00Z
4
value 0.92282
scoring_system epss
scoring_elements 0.99719
published_at 2026-04-13T12:55:00Z
5
value 0.92282
scoring_system epss
scoring_elements 0.99726
published_at 2026-04-29T12:55:00Z
6
value 0.92282
scoring_system epss
scoring_elements 0.99717
published_at 2026-04-02T12:55:00Z
7
value 0.92282
scoring_system epss
scoring_elements 0.99718
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10770
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1846270
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1846270
4
reference_url https://github.com/keycloak/keycloak
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/keycloak/keycloak
5
reference_url https://github.com/keycloak/keycloak/commit/55a064a978b0b7e0f0b93c33931f7dabe7d0d5e2
reference_id
reference_type
scores
url https://github.com/keycloak/keycloak/commit/55a064a978b0b7e0f0b93c33931f7dabe7d0d5e2
6
reference_url https://github.com/keycloak/keycloak-documentation/pull/1086
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/keycloak/keycloak-documentation/pull/1086
7
reference_url https://github.com/keycloak/keycloak/pull/7714
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/keycloak/keycloak/pull/7714
8
reference_url https://issues.redhat.com/browse/KEYCLOAK-14019
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/KEYCLOAK-14019
9
reference_url https://issues.redhat.com/browse/KEYCLOAK-3426
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/KEYCLOAK-3426
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-10770
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-10770
11
reference_url https://security.archlinux.org/AVG-1577
reference_id AVG-1577
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1577
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/webapps/50405.py
reference_id CVE-2020-10770
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/webapps/50405.py
13
reference_url https://github.com/advisories/GHSA-jh7q-5mwf-qvhw
reference_id GHSA-jh7q-5mwf-qvhw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jh7q-5mwf-qvhw
14
reference_url https://access.redhat.com/errata/RHSA-2021:0318
reference_id RHSA-2021:0318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0318
15
reference_url https://access.redhat.com/errata/RHSA-2021:0319
reference_id RHSA-2021:0319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0319
16
reference_url https://access.redhat.com/errata/RHSA-2021:0320
reference_id RHSA-2021:0320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0320
17
reference_url https://access.redhat.com/errata/RHSA-2021:0327
reference_id RHSA-2021:0327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0327
fixed_packages
0
url pkg:alpm/archlinux/keycloak@12.0.2-1
purl pkg:alpm/archlinux/keycloak@12.0.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5apu-r7pn-byet
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@12.0.2-1
aliases CVE-2020-10770, GHSA-jh7q-5mwf-qvhw
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6s4w-hv7a-ffaw
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@12.0.2-1