Search for packages
Package details: pkg:maven/org.keycloak/keycloak-core@22.0.2
purl pkg:maven/org.keycloak/keycloak-core@22.0.2
Next non-vulnerable version 26.1.3
Latest non-vulnerable version 26.1.3
Risk 4.0
Vulnerabilities affecting this package (12)
Vulnerability Summary Fixed by
VCID-27u9-dnbz-m3cu
Aliases:
CVE-2023-6841
GHSA-w97f-w3hq-36g2
Keycloak Denial of Service vulnerability A denial of service vulnerability was found in keycloak where the amount of attributes per object is not limited, an attacker by sending repeated HTTP requests could cause a resource exhaustion when the application send back rows with long attribute values. The issue is fixed in Keycloak 24 with the introduction of the User Profile feature.
24.0.0
Affected by 6 other vulnerabilities.
VCID-7t4n-1rts-g7cx
Aliases:
CVE-2023-6134
GHSA-cvg2-7c3j-g36j
Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri Keycloak prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This could permit an attacker to submit a specially crafted request leading to XSS or possibly further attacks.
23.0.0
Affected by 9 other vulnerabilities.
VCID-8kwu-hac9-1fhk
Aliases:
GHSA-57rh-gr4v-j5f6
Duplicate Advisory: Keycloak Uses a Key Past its Expiration Date # Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-xmmm-jw76-q7vg. This link is maintained to preserve external references. # Original Description A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute. A one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid.
24.0.7
Affected by 0 other vulnerabilities.
25.0.0
Affected by 3 other vulnerabilities.
VCID-d212-ftxm-23ft
Aliases:
GHSA-gmrm-8fx4-66x7
Duplicate Advisory: Keycloak: Leak of configured LDAP bind credentials ## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-c25h-c27q-5qpv. This link is maintained to preserve external references. ## Original Description A vulnerability was found in Keycloak. The LDAP testing endpoint allows changing the Connection URL  independently without re-entering the currently configured LDAP bind credentials. This flaw allows an attacker with admin access (permission manage-realm) to change the LDAP host URL ("Connection URL") to a machine they control. The Keycloak server will connect to the attacker's host and try to authenticate with the configured credentials, thus leaking them to the attacker. As a consequence, an attacker who has compromised the admin console or compromised a user with sufficient privileges can leak domain credentials and attack the domain.
25.0.0
Affected by 3 other vulnerabilities.
VCID-jmtd-5xd3-f3hb
Aliases:
CVE-2023-4918
GHSA-5q66-v53q-pm35
Keycloak vulnerable to Plaintext Storage of User Password A flaw was discovered in Keycloak Core package. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular attributes in the users attributes. The password is also created, but the user attributes must not be there. This way, any entities (all users and clients with proper rights/roles) are able to retrieve the users passwords in clear-text. ### Impact Passwords for self-registered users are stored as cleartext attributes associated with the user. ### Mitigation Disable self-registration for users in all realms until patched.
22.0.3
Affected by 11 other vulnerabilities.
VCID-mgb1-w1sr-eubj
Aliases:
CVE-2024-7260
GHSA-g4gc-rh26-m3p5
Keycloak Open Redirect vulnerability An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the `referrer` and `referrer_uri` parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into believing that the URL is safe, when, in fact, it redirects to a malicious server. This issue can result in a victim inadvertently trusting the destination of the redirect, potentially leading to a successful phishing attack or other types of attacks. Once a crafted URL is made, it can be sent to a Keycloak admin via email for example. This will trigger this vulnerability when the user visits the page and clicks the link. A malicious actor can use this to target users they know are Keycloak admins for further attacks. It may also be possible to bypass other domain-related security checks, such as supplying this as a OAuth redirect uri. The malicious actor can further obfuscate the `redirect_uri` using URL encoding, to hide the text of the actual malicious website domain.
24.0.7
Affected by 0 other vulnerabilities.
25.0.0
Affected by 3 other vulnerabilities.
VCID-sx3k-7dn2-eyag
Aliases:
CVE-2023-6927
GHSA-9vm7-v8wj-3fqw
GMS-2024-51
keycloak-core: open redirect via "form_post.jwt" JARM response mode An incomplete fix was found in Keycloak Core patch. An attacker can steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt". It is observed that changing the response_mode parameter in the original proof of concept from "form_post" to "form_post.jwt" can bypass the security patch implemented to address CVE-2023-6134.
23.0.4
Affected by 8 other vulnerabilities.
VCID-tpuz-5ntc-puc6
Aliases:
CVE-2024-7318
GHSA-xmmm-jw76-q7vg
Keycloaks's One Time Passcode (OTP) is valid longer than expiration timeSeverity A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute. A one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid.
24.0.7
Affected by 0 other vulnerabilities.
25.0.4
Affected by 2 other vulnerabilities.
VCID-u2dq-vdqf-jbez
Aliases:
CVE-2024-10039
GHSA-93ww-43rr-79v3
Keycloak mTLS Authentication Bypass via Reverse Proxy TLS Termination A vulnerability was found in Keycloak. Deployments of Keycloak with a reverse proxy not using pass-through termination of TLS, with mTLS enabled, are affected. This issue may allow an attacker on the local network to authenticate as any user or client that leverages mTLS as the authentication mechanism.
26.0.6
Affected by 1 other vulnerability.
VCID-xf12-zevt-8qha
Aliases:
CVE-2024-4028
GHSA-q4xq-445g-g6ch
Keycloak allows cross-site scripting (XSS) A vulnerability was found in Keycloak. This issue may allow a privileged attacker to use a malicious payload as the permission while creating items (Resource and Permissions) from the admin console, leading to a stored cross-site scripting (XSS) attack.
26.1.3
Affected by 0 other vulnerabilities.
VCID-ynan-6bh4-cfhq
Aliases:
CVE-2023-6291
GHSA-mpwq-j3xf-7m5w
The redirect_uri validation logic allows for bypassing explicitly allowed hosts that would otherwise be restricted An issue was found in the redirect_uri validation logic that allows for a bypass of otherwise explicitly allowed hosts. The problem arises in the verifyRedirectUri method, which attempts to enforce rules on user-controllable input, but essentially causes a desynchronization in how Keycloak and browsers interpret URLs. Keycloak, for example, receives "[www%2ekeycloak%2eorg%2fapp%2f:y@example.com](https://www%2ekeycloak%2eorg%2fapp%2f:y@example.com/)" and thinks the authority to be keycloak.org when it is actually example.com. This happens because the validation logic is performed on a URL decoded version, which no longer represents the original input. ### Acknowledgements Karel Knibbe
23.0.0
Affected by 9 other vulnerabilities.
VCID-z3nq-navw-h7hq
Aliases:
GHSA-3hrr-xwvg-hxvr
Duplicate Advisory: Keycloak DoS via account lockout # Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-cq42-vhv7-xr7p. This link is maintained to preserve external references. # Original Description A flaw was found in Keycloak. In certain conditions, this issue may allow a remote unauthenticated attacker to block other accounts from logging in.
24.0.0
Affected by 6 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T13:42:08.118856+00:00 GHSA Importer Affected by VCID-jmtd-5xd3-f3hb https://github.com/advisories/GHSA-5q66-v53q-pm35 37.0.0
2025-08-01T12:11:29.630135+00:00 GitLab Importer Affected by VCID-xf12-zevt-8qha https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/CVE-2024-4028.yml 37.0.0
2025-08-01T12:04:37.759671+00:00 GitLab Importer Affected by VCID-u2dq-vdqf-jbez https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/CVE-2024-10039.yml 37.0.0
2025-08-01T11:59:19.888367+00:00 GitLab Importer Affected by VCID-tpuz-5ntc-puc6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/GHSA-xmmm-jw76-q7vg.yml 37.0.0
2025-08-01T11:59:18.894989+00:00 GitLab Importer Affected by VCID-tpuz-5ntc-puc6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/CVE-2024-7318.yml 37.0.0
2025-08-01T11:55:07.696250+00:00 GitLab Importer Affected by VCID-27u9-dnbz-m3cu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/CVE-2023-6841.yml 37.0.0
2025-08-01T11:54:56.285598+00:00 GitLab Importer Affected by VCID-mgb1-w1sr-eubj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/CVE-2024-7260.yml 37.0.0
2025-08-01T11:54:54.749672+00:00 GitLab Importer Affected by VCID-8kwu-hac9-1fhk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/GHSA-57rh-gr4v-j5f6.yml 37.0.0
2025-08-01T11:49:21.846649+00:00 GitLab Importer Affected by VCID-d212-ftxm-23ft https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/GHSA-gmrm-8fx4-66x7.yml 37.0.0
2025-08-01T11:36:40.230743+00:00 GitLab Importer Affected by VCID-z3nq-navw-h7hq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/GHSA-3hrr-xwvg-hxvr.yml 37.0.0
2025-08-01T11:31:56.232175+00:00 GitLab Importer Affected by VCID-ynan-6bh4-cfhq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/CVE-2023-6291.yml 37.0.0
2025-08-01T11:31:44.994794+00:00 GitLab Importer Affected by VCID-sx3k-7dn2-eyag https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/GMS-2024-51.yml 37.0.0
2025-08-01T11:28:22.349339+00:00 GitLab Importer Affected by VCID-7t4n-1rts-g7cx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/CVE-2023-6134.yml 37.0.0
2025-07-31T09:29:57.582340+00:00 GitLab Importer Affected by VCID-jmtd-5xd3-f3hb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.keycloak/keycloak-core/CVE-2023-4918.yml 37.0.0
2025-07-31T08:41:10.842965+00:00 GithubOSV Importer Affected by VCID-jmtd-5xd3-f3hb https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-5q66-v53q-pm35/GHSA-5q66-v53q-pm35.json 37.0.0