Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.keycloak/keycloak-services@26.2.3
purl pkg:maven/org.keycloak/keycloak-services@26.2.3
Next non-vulnerable version 26.6.1
Latest non-vulnerable version 26.6.1
Risk 4.0
Vulnerabilities affecting this package (21)
Vulnerability Summary Fixed by
VCID-2dgp-xdrz-q7dv
Aliases:
GHSA-qj5r-2r5p-phc7
Duplicate Advisory: Keycloak-services SMTP Inject Vulnerability ### Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-m4j5-5x4r-2xp9. This link is maintained to preserve external references. ### Original Description A vulnerability was found in Keycloak-services. Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 characters (limited local part of the email), so the attack is limited to very shorts emails (subject and little data, the example is 60 chars). This flaw's only direct consequence is an unsolicited email being sent from the Keycloak server. However, this action could be a precursor for more sophisticated attacks.
26.3.3
Affected by 13 other vulnerabilities.
VCID-5f8r-n4mm-y3g6
Aliases:
CVE-2025-7365
GHSA-xhpr-465j-7p9q
Keycloak phishing attack via email verification step in first login flow There is a flaw with the first login flow where, during a IdP login, an attacker with a registered account can initiate the process to merge accounts with an existing victim's account. The attacker will subsequently be prompted to "review profile" information, which allows the the attacker to modify their email address to that of a victim's account. This triggers a verification email sent to the victim's email address. If the victim clicks the verification link, the attacker can gain access to the victim's account. While not a zero-interaction attack, the attacker's email address is not directly present in the verification email content, making it a potential phishing opportunity. This issue has been fixed in versions 26.0.13, 26.2.6, and 26.3.0.
26.2.6
Affected by 0 other vulnerabilities.
26.3.0
Affected by 20 other vulnerabilities.
VCID-5vwq-aqk5-nkh9
Aliases:
CVE-2026-1190
GHSA-63v5-26vq-m4vm
Keycloak's missing timestamp validation allows attackers to extend SAML response validity periods A flaw was found in Keycloak's SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption.
26.5.3
Affected by 10 other vulnerabilities.
VCID-7c1j-kcbb-v3f1
Aliases:
CVE-2026-3911
GHSA-xh32-c9wx-phrp
Keycloak: Information disclosure of disabled user attributes via administrative endpoint A flaw was found in Keycloak. An authenticated user with the view-users role could exploit a vulnerability in the UserResource component. By accessing a specific administrative endpoint, this user could improperly retrieve user attributes that were configured to be hidden. This unauthorized information disclosure could expose sensitive user data.
26.5.6
Affected by 5 other vulnerabilities.
VCID-9f1k-z7z2-d7cc
Aliases:
CVE-2025-7784
GHSA-27gp-8389-hm4w
Keycloak Privilege Escalation Vulnerability in Admin Console (FGAPv2 Enabled) A Privilege Escalation vulnerability was identified in the Keycloak identity and access management solution, specifically when FGAPv2 is enabled in version 26.2.x. The flaw lies in the admin permission enforcement logic, where a user with manage-users privileges can self-assign realm-admin rights. The escalation occurs due to missing privilege boundary checks in role mapping operations via the admin REST interface. A malicious administrator with limited permissions can exploit this by editing their own user roles, gaining unauthorized full access to realm configuration and user data. This issue has been fixed in versions 26.2.6, and 26.3.0.
26.2.6
Affected by 0 other vulnerabilities.
26.3.0
Affected by 20 other vulnerabilities.
VCID-gnxr-2t9g-4ye4
Aliases:
CVE-2025-8419
GHSA-m4j5-5x4r-2xp9
Keycloak SMTP Inject Vulnerability Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 characters (limited local part of the email), so the attack is limited to very shorts emails (subject and little data, the example is 60 chars). This flaw's only direct consequence is an unsolicited email being sent from the Keycloak server. However, this action could be a precursor for more sophisticated attacks.
26.2.8
Affected by 0 other vulnerabilities.
26.3.3
Affected by 13 other vulnerabilities.
VCID-gzz6-md9v-b3em
Aliases:
CVE-2026-3009
GHSA-m297-3jv9-m927
Keycloak allows authentication using an Identity Provider (IdP) even after it has been disabled by an administrator A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the administrative restriction. This undermines access control enforcement and may allow unauthorized authentication through a disabled external provider.
26.5.5
Affected by 9 other vulnerabilities.
VCID-m3uj-4mag-kbf2
Aliases:
CVE-2026-2733
GHSA-fjf4-6f34-w64q
Keycloak: Missing Check on Disabled Client for Docker Registry Protocol A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.
26.5.4
Affected by 8 other vulnerabilities.
VCID-mdkf-3bgs-w7dm
Aliases:
CVE-2026-4874
GHSA-22rm-wp4x-v5cx
Keycloak Server-Side Request Forgery via OIDC token endpoint manipulation A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.
26.6.1
Affected by 0 other vulnerabilities.
VCID-mku9-3bpp-aqbk
Aliases:
GHSA-83j7-mhw9-388w
Duplicate Advisory: Keycloak Privilege Escalation Vulnerability in Admin Console (FGAPv2 Enabled) ### Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-27gp-8389-hm4w. This link is maintained to preserve external references. ### Original Description A flaw was found in the Keycloak identity and access management system when Fine-Grained Admin Permissions (FGAPv2) are enabled. An administrative user with the manage-users role can escalate their privileges to realm-admin due to improper privilege enforcement. This vulnerability allows unauthorized elevation of access rights, compromising the intended separation of administrative duties and posing a security risk to the realm.
26.3.2
Affected by 15 other vulnerabilities.
VCID-nxhc-rp71-hbdk
Aliases:
GHSA-gj52-35xm-gxjh
Duplicate Advisory: Keycloak phishing attack via email verification step in first login flow ### Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-xhpr-465j-7p9q. This link is maintained to preserve external references. ### Original Description A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.
26.3.0
Affected by 20 other vulnerabilities.
VCID-qgbq-s33g-d7af
Aliases:
CVE-2026-3429
GHSA-8g9r-9wjw-37j4
Keycloak: Improper Access Control Leading to MFA Deletion and Account Takeover in Keycloak Account REST API A flaw was identified in the Account REST API of Keycloak that allows a user authenticated at a lower security level to perform sensitive actions intended only for higher-assurance sessions. Specifically, an attacker who has already obtained a victim’s password can delete the victim’s registered MFA/OTP credential without first proving possession of that factor. The attacker can then register their own MFA device, effectively taking full control of the account. This weakness undermines the intended protection provided by multi-factor authentication.
26.5.7
Affected by 4 other vulnerabilities.
VCID-szbr-v2vq-3kbn
Aliases:
CVE-2026-3121
GHSA-7xf9-4jfc-wgm4
Keycloak: manage-clients permission escalates to full realm admin access A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over roles, users, or other administrative functions within the realm. This privilege escalation can occur when admin permissions are enabled at the realm level.
26.5.6
Affected by 5 other vulnerabilities.
VCID-ugtk-3bjv-s3a4
Aliases:
CVE-2026-4628
GHSA-4pgc-gfrr-wcmg
Keycloak has Improper Access Control allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false A flaw was found in Keycloak. An improper Access Control vulnerability in Keycloak’s User-Managed Access (UMA) resource_set endpoint allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false restriction. This occurs due to incomplete enforcement of access control checks on PUT operations to the resource_set endpoint. This issue enables unauthorized modification of protected resources, impacting data integrity.
26.6.1
Affected by 0 other vulnerabilities.
VCID-v77w-st1u-pfe6
Aliases:
CVE-2026-3190
GHSA-q35r-vvhv-vx5h
Keycloak: Missing Role Enforcement on UMA 2.0 Permission Ticket Endpoint Leads to Information Disclosure A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure.
26.5.6
Affected by 5 other vulnerabilities.
VCID-ver5-9t6m-c3ef
Aliases:
CVE-2025-14083
GHSA-594w-2fwp-jwrc
Keycloak Admin REST API exposes backend schema and rules A flaw was found in the Keycloak Admin REST API. This vulnerability allows the exposure of backend schema and rules, potentially leading to targeted attacks or privilege escalation via improper access control.
26.3.0
Affected by 20 other vulnerabilities.
VCID-w5f1-xryr-fucq
Aliases:
CVE-2026-1035
GHSA-m2w5-7xhv-w6fh
Keycloak does not validate and update refresh token usage atomically A flaw was found in the Keycloak server during refresh token processing, specifically in the TokenManager class responsible for enforcing refresh token reuse policies. When strict refresh token rotation is enabled, the validation and update of refresh token usage are not performed atomically. This allows concurrent refresh requests to bypass single-use enforcement and issue multiple access tokens from the same refresh token. As a result, Keycloak’s refresh token rotation hardening can be undermined.
26.3.0
Affected by 20 other vulnerabilities.
VCID-x4aw-v76q-vbdc
Aliases:
CVE-2025-12150
GHSA-7g5x-9c4v-4w5r
Keycloak REST Services has a WebAuthn Attestation Statement Verification Bypass A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.
26.4.4
Affected by 12 other vulnerabilities.
VCID-xd7x-aevv-cfcp
Aliases:
CVE-2026-2575
GHSA-xv6h-r36f-3gp5
Keycloak: Denial of Service due to excessive SAMLRequest decompression A flaw was found in Keycloak. An unauthenticated remote attacker can trigger an application level Denial of Service (DoS) by sending a highly compressed SAMLRequest through the SAML Redirect Binding. The server fails to enforce size limits during DEFLATE decompression, leading to an OutOfMemoryError (OOM) and subsequent process termination. This vulnerability allows an attacker to disrupt the availability of the service.
26.5.4
Affected by 8 other vulnerabilities.
VCID-xfnw-15sz-zyfr
Aliases:
CVE-2025-14082
GHSA-6q37-7866-h27j
Keycloak Admin REST (Representational State Transfer) API does not properly enforce permissions A flaw was found in Keycloak Admin REST (Representational State Transfer) API. This vulnerability allows information disclosure of sensitive role metadata via insufficient authorization checks on the /admin/realms/{realm}/roles endpoint.
26.5.0
Affected by 18 other vulnerabilities.
VCID-y1h3-yyn9-53fr
Aliases:
CVE-2026-2603
GHSA-x4p7-7chp-64hq
Keycloak: Unauthorized authentication via disabled SAML Identity Provider A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to complete broker logins even when the SAML Identity Provider is disabled, leading to unauthorized authentication.
26.6.0
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-uuf2-u7xh-uuef Keycloak does not invalidate offline sessions when the offline_access scope is removed A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are. CVE-2025-12110
GHSA-895x-rfqp-jh5c

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-29T23:34:02.987076+00:00 GitLab Importer Affected by VCID-v77w-st1u-pfe6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3190.yml 38.5.0
2026-04-29T23:33:17.717569+00:00 GitLab Importer Affected by VCID-mdkf-3bgs-w7dm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-4874.yml 38.5.0
2026-04-29T23:33:14.069460+00:00 GitLab Importer Affected by VCID-szbr-v2vq-3kbn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3121.yml 38.5.0
2026-04-29T23:30:31.662245+00:00 GitLab Importer Affected by VCID-ugtk-3bjv-s3a4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-4628.yml 38.5.0
2026-04-29T23:28:06.844585+00:00 GitLab Importer Affected by VCID-y1h3-yyn9-53fr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-2603.yml 38.5.0
2026-04-29T23:28:03.535689+00:00 GitLab Importer Affected by VCID-xd7x-aevv-cfcp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-2575.yml 38.5.0
2026-04-29T23:19:14.441839+00:00 GitLab Importer Affected by VCID-qgbq-s33g-d7af https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3429.yml 38.5.0
2026-04-29T23:18:06.979289+00:00 GitLab Importer Affected by VCID-7c1j-kcbb-v3f1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3911.yml 38.5.0
2026-04-29T23:14:53.342959+00:00 GitLab Importer Affected by VCID-gzz6-md9v-b3em https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3009.yml 38.5.0
2026-04-29T23:10:32.348893+00:00 GitLab Importer Affected by VCID-x4aw-v76q-vbdc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12150.yml 38.5.0
2026-04-29T23:02:33.038803+00:00 GitLab Importer Affected by VCID-m3uj-4mag-kbf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-2733.yml 38.5.0
2026-04-29T22:55:08.624786+00:00 GitLab Importer Affected by VCID-5vwq-aqk5-nkh9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-1190.yml 38.5.0
2026-04-29T22:54:12.114780+00:00 GitLab Importer Affected by VCID-ver5-9t6m-c3ef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-14083.yml 38.5.0
2026-04-29T22:53:10.467265+00:00 GitLab Importer Affected by VCID-w5f1-xryr-fucq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-1035.yml 38.5.0
2026-04-29T22:44:49.901315+00:00 GitLab Importer Affected by VCID-xfnw-15sz-zyfr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-14082.yml 38.5.0
2026-04-29T22:31:29.970256+00:00 GitLab Importer Fixing VCID-uuf2-u7xh-uuef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12110.yml 38.5.0
2026-04-29T22:26:16.366112+00:00 GitLab Importer Affected by VCID-gnxr-2t9g-4ye4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-8419.yml 38.5.0
2026-04-29T22:16:15.207697+00:00 GitLab Importer Affected by VCID-2dgp-xdrz-q7dv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-qj5r-2r5p-phc7.yml 38.5.0
2026-04-29T22:15:59.560292+00:00 GitLab Importer Affected by VCID-5f8r-n4mm-y3g6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-7365.yml 38.5.0
2026-04-29T22:15:58.655120+00:00 GitLab Importer Affected by VCID-9f1k-z7z2-d7cc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-7784.yml 38.5.0
2026-04-29T22:15:02.531633+00:00 GitLab Importer Affected by VCID-mku9-3bpp-aqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-83j7-mhw9-388w.yml 38.5.0
2026-04-29T22:14:29.258548+00:00 GitLab Importer Affected by VCID-nxhc-rp71-hbdk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-gj52-35xm-gxjh.yml 38.5.0
2026-04-27T15:34:43.065661+00:00 GitLab Importer Affected by VCID-v77w-st1u-pfe6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3190.yml 38.4.0
2026-04-27T15:33:57.551115+00:00 GitLab Importer Affected by VCID-mdkf-3bgs-w7dm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-4874.yml 38.4.0
2026-04-27T15:33:53.489579+00:00 GitLab Importer Affected by VCID-szbr-v2vq-3kbn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3121.yml 38.4.0
2026-04-25T02:07:33.426210+00:00 GitLab Importer Affected by VCID-ugtk-3bjv-s3a4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-4628.yml 38.4.0
2026-04-19T18:07:56.705123+00:00 GitLab Importer Affected by VCID-y1h3-yyn9-53fr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-2603.yml 38.4.0
2026-04-19T18:07:52.921796+00:00 GitLab Importer Affected by VCID-xd7x-aevv-cfcp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-2575.yml 38.4.0
2026-04-17T00:35:26.013468+00:00 GitLab Importer Affected by VCID-qgbq-s33g-d7af https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3429.yml 38.4.0
2026-04-17T00:34:19.401946+00:00 GitLab Importer Affected by VCID-7c1j-kcbb-v3f1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3911.yml 38.4.0
2026-04-17T00:31:10.876266+00:00 GitLab Importer Affected by VCID-gzz6-md9v-b3em https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3009.yml 38.4.0
2026-04-17T00:27:40.973474+00:00 GitLab Importer Affected by VCID-x4aw-v76q-vbdc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12150.yml 38.4.0
2026-04-17T00:19:27.693386+00:00 GitLab Importer Affected by VCID-m3uj-4mag-kbf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-2733.yml 38.4.0
2026-04-17T00:12:27.776960+00:00 GitLab Importer Affected by VCID-5vwq-aqk5-nkh9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-1190.yml 38.4.0
2026-04-17T00:11:34.693954+00:00 GitLab Importer Affected by VCID-ver5-9t6m-c3ef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-14083.yml 38.4.0
2026-04-17T00:10:32.864377+00:00 GitLab Importer Affected by VCID-w5f1-xryr-fucq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-1035.yml 38.4.0
2026-04-17T00:02:20.453840+00:00 GitLab Importer Affected by VCID-xfnw-15sz-zyfr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-14082.yml 38.4.0
2026-04-16T23:49:35.765188+00:00 GitLab Importer Fixing VCID-uuf2-u7xh-uuef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12110.yml 38.4.0
2026-04-16T23:44:17.176030+00:00 GitLab Importer Affected by VCID-gnxr-2t9g-4ye4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-8419.yml 38.4.0
2026-04-16T23:34:34.536599+00:00 GitLab Importer Affected by VCID-2dgp-xdrz-q7dv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-qj5r-2r5p-phc7.yml 38.4.0
2026-04-16T23:34:20.059756+00:00 GitLab Importer Affected by VCID-5f8r-n4mm-y3g6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-7365.yml 38.4.0
2026-04-16T23:34:19.150343+00:00 GitLab Importer Affected by VCID-9f1k-z7z2-d7cc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-7784.yml 38.4.0
2026-04-16T23:33:30.179189+00:00 GitLab Importer Affected by VCID-mku9-3bpp-aqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-83j7-mhw9-388w.yml 38.4.0
2026-04-16T23:32:56.749219+00:00 GitLab Importer Affected by VCID-nxhc-rp71-hbdk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-gj52-35xm-gxjh.yml 38.4.0
2026-04-12T02:00:43.826648+00:00 GitLab Importer Affected by VCID-qgbq-s33g-d7af https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3429.yml 38.3.0
2026-04-12T01:59:22.068067+00:00 GitLab Importer Affected by VCID-7c1j-kcbb-v3f1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3911.yml 38.3.0
2026-04-12T01:55:53.614939+00:00 GitLab Importer Affected by VCID-gzz6-md9v-b3em https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3009.yml 38.3.0
2026-04-12T01:52:21.839234+00:00 GitLab Importer Affected by VCID-x4aw-v76q-vbdc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12150.yml 38.3.0
2026-04-12T01:43:50.435852+00:00 GitLab Importer Affected by VCID-m3uj-4mag-kbf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-2733.yml 38.3.0
2026-04-12T01:36:17.394630+00:00 GitLab Importer Affected by VCID-5vwq-aqk5-nkh9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-1190.yml 38.3.0
2026-04-12T01:35:22.770384+00:00 GitLab Importer Affected by VCID-ver5-9t6m-c3ef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-14083.yml 38.3.0
2026-04-12T01:34:15.418386+00:00 GitLab Importer Affected by VCID-w5f1-xryr-fucq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-1035.yml 38.3.0
2026-04-12T01:25:21.350253+00:00 GitLab Importer Affected by VCID-xfnw-15sz-zyfr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-14082.yml 38.3.0
2026-04-12T01:11:00.514331+00:00 GitLab Importer Fixing VCID-uuf2-u7xh-uuef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12110.yml 38.3.0
2026-04-12T01:05:09.260426+00:00 GitLab Importer Affected by VCID-gnxr-2t9g-4ye4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-8419.yml 38.3.0
2026-04-12T00:54:44.996089+00:00 GitLab Importer Affected by VCID-2dgp-xdrz-q7dv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-qj5r-2r5p-phc7.yml 38.3.0
2026-04-12T00:54:27.747820+00:00 GitLab Importer Affected by VCID-5f8r-n4mm-y3g6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-7365.yml 38.3.0
2026-04-12T00:54:26.806801+00:00 GitLab Importer Affected by VCID-9f1k-z7z2-d7cc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-7784.yml 38.3.0
2026-04-12T00:53:32.312536+00:00 GitLab Importer Affected by VCID-mku9-3bpp-aqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-83j7-mhw9-388w.yml 38.3.0
2026-04-12T00:52:54.781172+00:00 GitLab Importer Affected by VCID-nxhc-rp71-hbdk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-gj52-35xm-gxjh.yml 38.3.0
2026-04-08T03:25:05.377514+00:00 GitLab Importer Affected by VCID-gzz6-md9v-b3em https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-3009.yml 38.1.0
2026-04-03T02:00:41.288257+00:00 GitLab Importer Affected by VCID-x4aw-v76q-vbdc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12150.yml 38.1.0
2026-04-03T01:52:42.026378+00:00 GitLab Importer Affected by VCID-m3uj-4mag-kbf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-2733.yml 38.1.0
2026-04-03T01:45:18.479022+00:00 GitLab Importer Affected by VCID-5vwq-aqk5-nkh9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-1190.yml 38.1.0
2026-04-03T01:44:26.936006+00:00 GitLab Importer Affected by VCID-ver5-9t6m-c3ef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-14083.yml 38.1.0
2026-04-03T01:43:14.391138+00:00 GitLab Importer Affected by VCID-w5f1-xryr-fucq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2026-1035.yml 38.1.0
2026-04-03T01:34:07.698775+00:00 GitLab Importer Affected by VCID-xfnw-15sz-zyfr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-14082.yml 38.1.0
2026-04-03T01:19:52.814129+00:00 GitLab Importer Fixing VCID-uuf2-u7xh-uuef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12110.yml 38.1.0
2026-04-03T01:13:32.823891+00:00 GitLab Importer Affected by VCID-gnxr-2t9g-4ye4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-8419.yml 38.1.0
2026-04-03T01:02:52.398902+00:00 GitLab Importer Affected by VCID-2dgp-xdrz-q7dv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-qj5r-2r5p-phc7.yml 38.1.0
2026-04-03T01:02:34.747717+00:00 GitLab Importer Affected by VCID-5f8r-n4mm-y3g6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-7365.yml 38.1.0
2026-04-03T01:02:33.845802+00:00 GitLab Importer Affected by VCID-9f1k-z7z2-d7cc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-7784.yml 38.1.0
2026-04-03T01:01:40.455327+00:00 GitLab Importer Affected by VCID-mku9-3bpp-aqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-83j7-mhw9-388w.yml 38.1.0
2026-04-03T01:01:04.568999+00:00 GitLab Importer Affected by VCID-nxhc-rp71-hbdk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/GHSA-gj52-35xm-gxjh.yml 38.1.0
2026-04-01T16:06:59.449987+00:00 GHSA Importer Fixing VCID-uuf2-u7xh-uuef https://github.com/advisories/GHSA-895x-rfqp-jh5c 38.0.0
2026-04-01T12:54:29.086305+00:00 GithubOSV Importer Fixing VCID-uuf2-u7xh-uuef https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-895x-rfqp-jh5c/GHSA-895x-rfqp-jh5c.json 38.0.0
2026-04-01T12:53:03.275509+00:00 GitLab Importer Fixing VCID-uuf2-u7xh-uuef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-services/CVE-2025-12110.yml 38.0.0