Vulnerabilities > Redhat > Keycloak > 4.8.3

DATE CVE VULNERABILITY TITLE RISK
2022-07-08 CVE-2022-1245 Authorization Bypass Through User-Controlled Key vulnerability in Redhat Keycloak
A privilege escalation flaw was found in the token exchange feature of keycloak.
network
low complexity
redhat CWE-639
critical
9.8
2022-04-26 CVE-2022-1466 Incorrect Authorization vulnerability in Redhat Keycloak
Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform.
network
low complexity
redhat CWE-863
4.0
2022-03-25 CVE-2021-20323 Cross-site Scripting vulnerability in Redhat Keycloak
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.
network
redhat CWE-79
4.3
2021-07-09 CVE-2021-3637 Allocation of Resources Without Limits or Throttling vulnerability in Redhat Keycloak
A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.
network
low complexity
redhat CWE-770
5.0
2021-05-28 CVE-2020-27826 Execution with Unnecessary Privileges vulnerability in Redhat Keycloak
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API.
network
redhat CWE-250
4.9
2021-05-28 CVE-2021-20195 Improper Encoding or Escaping of Output vulnerability in Redhat Keycloak
A flaw was found in keycloak in versions before 13.0.0.
network
redhat CWE-116
6.8
2021-05-12 CVE-2021-20202 Insecure Temporary File vulnerability in Redhat Keycloak
A flaw was found in keycloak.
local
low complexity
redhat CWE-377
4.6
2020-12-15 CVE-2020-10770 Server-Side Request Forgery (SSRF) vulnerability in Redhat Keycloak
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri.
network
low complexity
redhat CWE-918
5.3
2020-11-17 CVE-2020-14389 Use of Password Hash With Insufficient Computational Effort vulnerability in Redhat Keycloak
It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have.
network
low complexity
redhat CWE-916
8.1
2020-11-09 CVE-2020-14366 Path Traversal vulnerability in Redhat Keycloak
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path.
network
low complexity
redhat CWE-22
7.5