Search for vulnerabilities
| Vulnerability ID | VCID-4wff-yxx3-fudx |
| Aliases |
GHSA-m98g-63qj-fp8j
GMS-2022-1097 |
| Summary | Reflected XSS on clients-registrations endpoint A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak. When a malicious request is sent to the client registration endpoint, the error message is not properly escaped, allowing an attacker to execute malicious scripts into the user's browser. ### Acknowledgement Keycloak would like to thank Quentin TEXIER (Pentester at Opencyber) for reporting this issue. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 6.2 |
| Risk | 3.1 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| cvssv3.1_qr | MODERATE | https://github.com/advisories/GHSA-m98g-63qj-fp8j |
| generic_textual | MODERATE | https://github.com/keycloak/keycloak |
| cvssv3.1_qr | MODERATE | https://github.com/keycloak/keycloak/security/advisories/GHSA-m98g-63qj-fp8j |
| generic_textual | MODERATE | https://github.com/keycloak/keycloak/security/advisories/GHSA-m98g-63qj-fp8j |
| Reference id | Reference type | URL |
|---|---|---|
| https://github.com/keycloak/keycloak | ||
| https://github.com/keycloak/keycloak/security/advisories/GHSA-m98g-63qj-fp8j | ||
| GHSA-m98g-63qj-fp8j | https://github.com/advisories/GHSA-m98g-63qj-fp8j |
No EPSS data available for this vulnerability.
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T08:59:41.982286+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-m98g-63qj-fp8j/GHSA-m98g-63qj-fp8j.json | 37.0.0 |