Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.keycloak/keycloak-ldap-federation@22.0.1 |
| Type | maven |
| Namespace | org.keycloak |
| Name | keycloak-ldap-federation |
| Version | 22.0.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 26.4.6 |
| Latest_non_vulnerable_version | 26.4.6 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-3vxq-nfzs-zugz |
| vulnerability_id |
VCID-3vxq-nfzs-zugz |
| summary |
Duplicate Advisory: Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-4hx9-48xh-5mxr. This link is maintained to preserve external references.
### Original Description
A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
GHSA-93vm-mqpw-8wh3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3vxq-nfzs-zugz |
|
| 1 |
| url |
VCID-rrkd-31d4-9yaq |
| vulnerability_id |
VCID-rrkd-31d4-9yaq |
| summary |
Keycloak vulnerable to LDAP Injection on UsernameForm Login
A flaw was found in the Keycloak package. This flaw allows an attacker to benefit from an LDAP query and access existing usernames in the server. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2232 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24445 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24479 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29831 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29826 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29888 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29924 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29929 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29883 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29852 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2232 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2232, GHSA-8hc5-rmgf-qx6p
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rrkd-31d4-9yaq |
|
| 2 |
| url |
VCID-wg6h-c3vm-n7h9 |
| vulnerability_id |
VCID-wg6h-c3vm-n7h9 |
| summary |
Duplicate Advisory: Authentication Bypass Due to Missing LDAP Bind After Password Reset in Keycloak
# Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-2p82-5wwr-43cw. This link is maintained to preserve external references.
# Original Description
A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-m3hp-8546-5qmr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wg6h-c3vm-n7h9 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.4 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.keycloak/keycloak-ldap-federation@22.0.1 |