Search for vulnerabilities
Vulnerability details: VCID-mgb1-w1sr-eubj
Vulnerability ID VCID-mgb1-w1sr-eubj
Aliases CVE-2024-7260
GHSA-g4gc-rh26-m3p5
Summary Keycloak Open Redirect vulnerability An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the `referrer` and `referrer_uri` parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into believing that the URL is safe, when, in fact, it redirects to a malicious server. This issue can result in a victim inadvertently trusting the destination of the redirect, potentially leading to a successful phishing attack or other types of attacks. Once a crafted URL is made, it can be sent to a Keycloak admin via email for example. This will trigger this vulnerability when the user visits the page and clicks the link. A malicious actor can use this to target users they know are Keycloak admins for further attacks. It may also be possible to bypass other domain-related security checks, such as supplying this as a OAuth redirect uri. The malicious actor can further obfuscate the `redirect_uri` using URL encoding, to hide the text of the actual malicious website domain.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 4.4 https://access.redhat.com/errata/RHSA-2024:6502
cvssv3.1 6.1 https://access.redhat.com/errata/RHSA-2024:6502
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2024:6502
ssvc Track https://access.redhat.com/errata/RHSA-2024:6502
cvssv3.1 4.4 https://access.redhat.com/errata/RHSA-2024:6503
cvssv3.1 6.1 https://access.redhat.com/errata/RHSA-2024:6503
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2024:6503
ssvc Track https://access.redhat.com/errata/RHSA-2024:6503
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7260.json
cvssv3.1 4.4 https://access.redhat.com/security/cve/CVE-2024-7260
cvssv3.1 6.1 https://access.redhat.com/security/cve/CVE-2024-7260
generic_textual MODERATE https://access.redhat.com/security/cve/CVE-2024-7260
ssvc Track https://access.redhat.com/security/cve/CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
epss 0.0015 https://api.first.org/data/v1/epss?cve=CVE-2024-7260
cvssv3.1 4.4 https://bugzilla.redhat.com/show_bug.cgi?id=2301875
cvssv3.1 6.1 https://bugzilla.redhat.com/show_bug.cgi?id=2301875
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=2301875
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2301875
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-g4gc-rh26-m3p5
cvssv3.1 4.4 https://github.com/keycloak/keycloak
generic_textual MODERATE https://github.com/keycloak/keycloak
cvssv3.1 4.4 https://nvd.nist.gov/vuln/detail/CVE-2024-7260
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2024-7260
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2024-7260
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:6502
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:6502
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-09T19:13:21Z/ Found at https://access.redhat.com/errata/RHSA-2024:6502
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:6503
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2024:6503
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-09T19:13:21Z/ Found at https://access.redhat.com/errata/RHSA-2024:6503
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7260.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/security/cve/CVE-2024-7260
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/security/cve/CVE-2024-7260
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-09T19:13:21Z/ Found at https://access.redhat.com/security/cve/CVE-2024-7260
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2301875
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2301875
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-09T19:13:21Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2301875
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-7260
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-7260
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.3634
EPSS Score 0.0015
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:31:03.944809+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-g4gc-rh26-m3p5/GHSA-g4gc-rh26-m3p5.json 37.0.0