Search for vulnerabilities
Vulnerability details: VCID-v5pm-xqua-47a2
Vulnerability ID VCID-v5pm-xqua-47a2
Aliases CVE-2024-4540
GHSA-69fp-7c8p-crjr
Summary Keycloak exposes sensitive information in Pushed Authorization Requests (PAR) A flaw was found in Keycloak in the OAuth 2.0 Pushed Authorization Requests (PAR). Client provided parameters were found to be included in plain text in the KC_RESTART cookie returned by the authorization server's HTTP response to a request_uri authorization request. This could lead to an information disclosure vulnerability.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3566
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3566
ssvc Track https://access.redhat.com/errata/RHSA-2024:3566
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3567
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3567
ssvc Track https://access.redhat.com/errata/RHSA-2024:3567
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3568
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3568
ssvc Track https://access.redhat.com/errata/RHSA-2024:3568
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3570
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3570
ssvc Track https://access.redhat.com/errata/RHSA-2024:3570
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3572
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3572
ssvc Track https://access.redhat.com/errata/RHSA-2024:3572
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3573
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3573
ssvc Track https://access.redhat.com/errata/RHSA-2024:3573
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3574
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3574
ssvc Track https://access.redhat.com/errata/RHSA-2024:3574
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3575
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3575
ssvc Track https://access.redhat.com/errata/RHSA-2024:3575
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:3576
generic_textual HIGH https://access.redhat.com/errata/RHSA-2024:3576
ssvc Track https://access.redhat.com/errata/RHSA-2024:3576
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4540.json
cvssv3.1 7.5 https://access.redhat.com/security/cve/CVE-2024-4540
generic_textual HIGH https://access.redhat.com/security/cve/CVE-2024-4540
ssvc Track https://access.redhat.com/security/cve/CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0039 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
epss 0.0039 https://api.first.org/data/v1/epss?cve=CVE-2024-4540
cvssv3.1 7.5 https://bugzilla.redhat.com/show_bug.cgi?id=2279303
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=2279303
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2279303
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-69fp-7c8p-crjr
cvssv3.1 7.5 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1 7.5 https://github.com/keycloak/keycloak/commit/2191cc26ae6deb52eeaf74046027b65804d16fd0
generic_textual HIGH https://github.com/keycloak/keycloak/commit/2191cc26ae6deb52eeaf74046027b65804d16fd0
cvssv3.1 7.5 https://github.com/keycloak/keycloak/security/advisories/GHSA-69fp-7c8p-crjr
cvssv3.1_qr HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-69fp-7c8p-crjr
generic_textual HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-69fp-7c8p-crjr
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2024-4540
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2024-4540
Reference id Reference type URL
https://access.redhat.com/errata/RHSA-2024:3566
https://access.redhat.com/errata/RHSA-2024:3567
https://access.redhat.com/errata/RHSA-2024:3568
https://access.redhat.com/errata/RHSA-2024:3570
https://access.redhat.com/errata/RHSA-2024:3572
https://access.redhat.com/errata/RHSA-2024:3573
https://access.redhat.com/errata/RHSA-2024:3574
https://access.redhat.com/errata/RHSA-2024:3575
https://access.redhat.com/errata/RHSA-2024:3576
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4540.json
https://access.redhat.com/security/cve/CVE-2024-4540
https://api.first.org/data/v1/epss?cve=CVE-2024-4540
https://bugzilla.redhat.com/show_bug.cgi?id=2279303
https://github.com/keycloak/keycloak
https://github.com/keycloak/keycloak/commit/2191cc26ae6deb52eeaf74046027b65804d16fd0
https://github.com/keycloak/keycloak/security/advisories/GHSA-69fp-7c8p-crjr
https://nvd.nist.gov/vuln/detail/CVE-2024-4540
cpe:/a:redhat:build_keycloak:22 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:22
cpe:/a:redhat:build_keycloak:22::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:22::el9
cpe:/a:redhat:build_keycloak:24::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:build_keycloak:24::el9
cpe:/a:redhat:red_hat_single_sign_on:7.6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6
cpe:/a:redhat:red_hat_single_sign_on:7.6::el7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
cpe:/a:redhat:red_hat_single_sign_on:7.6::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
cpe:/a:redhat:red_hat_single_sign_on:7.6::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
cpe:/a:redhat:rhosemc:1.0::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhosemc:1.0::el8
GHSA-69fp-7c8p-crjr https://github.com/advisories/GHSA-69fp-7c8p-crjr
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3566
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3566
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3567
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3567
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3568
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3568
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3570
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3570
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3572
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3572
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3573
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3573
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3574
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3574
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3575
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3575
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2024:3576
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/errata/RHSA-2024:3576
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4540.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/security/cve/CVE-2024-4540
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://access.redhat.com/security/cve/CVE-2024-4540
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2279303
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-03T16:13:25Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2279303
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/keycloak/keycloak/commit/2191cc26ae6deb52eeaf74046027b65804d16fd0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/keycloak/keycloak/security/advisories/GHSA-69fp-7c8p-crjr
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-4540
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.58677
EPSS Score 0.0038
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:35:05.160890+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-69fp-7c8p-crjr/GHSA-69fp-7c8p-crjr.json 37.0.0