Search for vulnerabilities
Vulnerability details: VCID-7wwd-mrdx-mub6
Vulnerability ID VCID-7wwd-mrdx-mub6
Aliases CVE-2024-2419
GHSA-mrv8-pqfj-7gp5
Summary Keycloak path traversal vulnerability in the redirect validation An issue was found in the redirect_uri validation logic that allows for a bypass of otherwise explicitly allowed hosts.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 7.1 https://access.redhat.com/errata/RHSA-2024:1867
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:1867
ssvc Track https://access.redhat.com/errata/RHSA-2024:1867
cvssv3 7.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2419.json
cvssv3.1 7.1 https://access.redhat.com/security/cve/CVE-2024-2419
generic_textual HIGH https://access.redhat.com/security/cve/CVE-2024-2419
ssvc Track https://access.redhat.com/security/cve/CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2024-2419
cvssv3.1 7.1 https://bugzilla.redhat.com/show_bug.cgi?id=2269371
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=2269371
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2269371
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-mrv8-pqfj-7gp5
cvssv3.1 7.1 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1 7.1 https://github.com/keycloak/keycloak/security/advisories/GHSA-mrv8-pqfj-7gp5
cvssv3.1_qr HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-mrv8-pqfj-7gp5
generic_textual HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-mrv8-pqfj-7gp5
cvssv3.1 7.1 https://nvd.nist.gov/vuln/detail/CVE-2024-2419
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2024-2419
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://access.redhat.com/errata/RHSA-2024:1867
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T19:49:32Z/ Found at https://access.redhat.com/errata/RHSA-2024:1867
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2419.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://access.redhat.com/security/cve/CVE-2024-2419
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T19:49:32Z/ Found at https://access.redhat.com/security/cve/CVE-2024-2419
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://bugzilla.redhat.com/show_bug.cgi?id=2269371
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T19:49:32Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2269371
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://github.com/keycloak/keycloak/security/advisories/GHSA-mrv8-pqfj-7gp5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2024-2419
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.15619
EPSS Score 0.00051
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:30:38.305138+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-mrv8-pqfj-7gp5/GHSA-mrv8-pqfj-7gp5.json 37.0.0