Search for vulnerabilities
Vulnerability details: VCID-g8vq-taau-q7cj
Vulnerability ID VCID-g8vq-taau-q7cj
Aliases CVE-2022-4361
GHSA-3p62-6fjh-3p5h
Summary Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC AssertionConsumerServiceURL is a Java implementation for SAML Service Providers (org.keycloak.protocol.saml). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). AssertionConsumerServiceURL allows XSS when sending a crafted SAML XML request.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4361.json
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
epss 0.00311 https://api.first.org/data/v1/epss?cve=CVE-2022-4361
cvssv3.1 10 https://bugzilla.redhat.com/show_bug.cgi?id=2151618
cvssv3.1 10.0 https://bugzilla.redhat.com/show_bug.cgi?id=2151618
generic_textual CRITICAL https://bugzilla.redhat.com/show_bug.cgi?id=2151618
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2151618
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-3p62-6fjh-3p5h
cvssv3.1 10.0 https://github.com/keycloak/keycloak
generic_textual CRITICAL https://github.com/keycloak/keycloak
cvssv3.1 10 https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
cvssv3.1 10.0 https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
generic_textual CRITICAL https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
ssvc Track https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
cvssv3.1 10.0 https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h
cvssv3.1_qr CRITICAL https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h
generic_textual CRITICAL https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h
cvssv3.1 10.0 https://nvd.nist.gov/vuln/detail/CVE-2022-4361
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2022-4361
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2022-4361
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4361.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=2151618
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=2151618
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:43:33Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2151618
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:43:33Z/ Found at https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-4361
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-4361
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.53731
EPSS Score 0.00311
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:45:22.794566+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-3p62-6fjh-3p5h/GHSA-3p62-6fjh-3p5h.json 37.0.0