Search for packages
Package details: pkg:npm/keycloak-connect@13.0.0
purl pkg:npm/keycloak-connect@13.0.0
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (10)
Vulnerability Summary Fixed by
VCID-65b2-56z7-hfan
Aliases:
CVE-2022-3916
GHSA-97g8-xfvw-q4hg
GMS-2022-8406
Keycloak vulnerable to session takeover with OIDC offline refreshtokens An issue was discovered in Keycloak when using a client with the `offline_access` scope. Reuse of session ids across root and user authentication sessions and a lack of root session validation enabled attackers to resolve a user session attached to a different previously authenticated user. This issue most affects users of shared computers. Suppose a user logs out of their account (without clearing their cookies) in a mobile app or similar client that includes the `offline_access` scope, and another user authenticates to the application. In that case, it will share the same root session id, and when utilizing the refresh token, they will be issued a token for the original user.
20.0.2
Affected by 7 other vulnerabilities.
VCID-7t4n-1rts-g7cx
Aliases:
CVE-2023-6134
GHSA-cvg2-7c3j-g36j
Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri Keycloak prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This could permit an attacker to submit a specially crafted request leading to XSS or possibly further attacks.
23.0.0
Affected by 1 other vulnerability.
VCID-919t-yfm6-dydu
Aliases:
CVE-2023-0091
GHSA-v436-q368-hvgg
GMS-2023-37
Keycloak has lack of validation of access token on client registrations endpoint When a service account with the create-client or manage-clients role can use the client-registration endpoints to create/manage clients with an access token. If the access token is leaked, there is an option to revoke the specific token. However, the check is not performed in client-registration endpoints. There are no reported fixed by versions.
VCID-9vph-vtgn-7yhs
Aliases:
CVE-2023-0105
GHSA-c7xw-p58w-h6fj
Keycloak: Impersonation and lockout possible through incorrect handling of email trust Impersonation and lockout are possible due to email trust not being handled correctly in Keycloak. Since the verified state is not reset when the email changes, it is possible for users to shadow others with the same email and lock out or impersonate them. There are no reported fixed by versions.
VCID-c3gj-w7y1-d3dm
Aliases:
CVE-2022-1466
GHSA-f32v-vf79-p29q
Improper authorization in Keycloak Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.
17.0.1
Affected by 9 other vulnerabilities.
VCID-q2c3-9u54-j3h2
Aliases:
CVE-2022-2237
GHSA-59fq-727j-hm3f
GMS-2023-578
keycloak-connect contains Open redirect vulnerability in the Node.js adapter There is an Open Redirect vulnerability in the Node.js adapter when forwarding requests to Keycloak using `checkSSO` with query param `prompt=none`.
18.0.2
Affected by 8 other vulnerabilities.
21.0.1
Affected by 5 other vulnerabilities.
VCID-rmk2-8vdv-ubdt
Aliases:
CVE-2023-48795
GHSA-45x7-px36-x8w8
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust. There are no reported fixed by versions.
VCID-ubns-dvvn-3kej
Aliases:
CVE-2022-4137
GHSA-9hhc-pj4w-w5rv
GMS-2023-616
Keycloak Cross-site Scripting on OpenID connect login service A reflected cross-site scripting (XSS) vulnerability was found in the `oob` OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. There are no reported fixed by versions.
VCID-xkq6-s5da-yub7
Aliases:
CVE-2022-1438
GHSA-w354-2f3c-qvg9
GMS-2023-529
Keycloak vulnerable to Cross-site Scripting A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability. ## Details This issue is the result of code found in the exception here: [https://github.com/keycloak/keycloak/blob/48835576daa158443f69917ac309e1a7c951bc87/services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java#L1045](https://github.com/keycloak/keycloak/blob/48835576daa158443f69917ac309e1a7c951bc87/services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java#L1045) ## Steps to reproduce When using the legacy admin console: 1. Sign in as Admin user in first tab. 2. In that tab create new user in keycloak admin section > intercept user creation request and modify it by including malicious js script there (in username field). 3. Sign in as newly created user in second tab (same browser window but second tab). 4. Navigate back to first tab where you are signed in as admin, navigate to admin console which lists all application users. 5. Choose any user (except newly created malicious one) – modify anything for that user in his settings. E.g. navigate to credentials tab and set new credentials for him. Also set new password as temporary. 6. After update for that user is made, use impersonate option on that modified user. 7. You should see window with form which requires providing new credentials – fill it and submit request. 8. Just after submiting request user will get notified that “You are already authenticated as different user ‘[user + payload]’ in this session. Please sign out first.” And malicious payload will be executed instantly. There are no reported fixed by versions.
VCID-ynan-6bh4-cfhq
Aliases:
CVE-2023-6291
GHSA-mpwq-j3xf-7m5w
The redirect_uri validation logic allows for bypassing explicitly allowed hosts that would otherwise be restricted An issue was found in the redirect_uri validation logic that allows for a bypass of otherwise explicitly allowed hosts. The problem arises in the verifyRedirectUri method, which attempts to enforce rules on user-controllable input, but essentially causes a desynchronization in how Keycloak and browsers interpret URLs. Keycloak, for example, receives "[www%2ekeycloak%2eorg%2fapp%2f:y@example.com](https://www%2ekeycloak%2eorg%2fapp%2f:y@example.com/)" and thinks the authority to be keycloak.org when it is actually example.com. This happens because the validation logic is performed on a URL decoded version, which no longer represents the original input. ### Acknowledgements Karel Knibbe
23.0.0
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-b6mp-jcq2-uqbv Temporary Directory Hijacking Vulnerability in Keycloak A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity. CVE-2021-20202
GHSA-6xp6-fmc8-pmmr
VCID-dtkn-4bxm-2qaj Code injection in keycloak A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. CVE-2021-20222
GHSA-2mq8-99q7-55wx
VCID-gyrk-cxkp-uyh8 Incorrect implementation of lockout feature in Keycloak A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality. CVE-2021-3513
GHSA-xv7h-95r7-595j

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T11:31:55.260547+00:00 GitLab Importer Affected by VCID-ynan-6bh4-cfhq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2023-6291.yml 37.0.0
2025-08-01T11:29:33.461364+00:00 GitLab Importer Affected by VCID-rmk2-8vdv-ubdt https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2023-48795.yml 37.0.0
2025-08-01T11:28:26.541537+00:00 GitLab Importer Affected by VCID-7t4n-1rts-g7cx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2023-6134.yml 37.0.0
2025-08-01T11:21:02.752353+00:00 GitLab Importer Affected by VCID-ubns-dvvn-3kej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2022-4137.yml 37.0.0
2025-08-01T11:20:43.894139+00:00 GitLab Importer Affected by VCID-xkq6-s5da-yub7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2022-1438.yml 37.0.0
2025-08-01T11:20:39.906346+00:00 GitLab Importer Affected by VCID-65b2-56z7-hfan https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2022-3916.yml 37.0.0
2025-08-01T11:16:29.024394+00:00 GitLab Importer Fixing VCID-dtkn-4bxm-2qaj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2021-20222.yml 37.0.0
2025-08-01T11:05:03.616584+00:00 GitLab Importer Affected by VCID-q2c3-9u54-j3h2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/GMS-2023-578.yml 37.0.0
2025-08-01T10:58:09.677976+00:00 GitLab Importer Affected by VCID-9vph-vtgn-7yhs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2023-0105.yml 37.0.0
2025-08-01T10:58:08.154806+00:00 GitLab Importer Affected by VCID-919t-yfm6-dydu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2023-0091.yml 37.0.0
2025-08-01T10:44:25.979680+00:00 GitLab Importer Fixing VCID-gyrk-cxkp-uyh8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2021-3513.yml 37.0.0
2025-08-01T10:21:09.817121+00:00 GitLab Importer Affected by VCID-c3gj-w7y1-d3dm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2022-1466.yml 37.0.0
2025-08-01T09:53:55.820916+00:00 GitLab Importer Fixing VCID-b6mp-jcq2-uqbv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/keycloak-connect/CVE-2021-20202.yml 37.0.0