Red Hat Keycloak Vulnerabilities
Red%20hat Keycloak vulnerabilities.
Vulnerability Published:
🗓️ Published
- Anytime
Sort By:
🗓️ Published Date
- Descending
CORS Header Injection Vulnerability Affecting Keycloak by Red Hat
CVE-2026-37977Red HatRed Hat Build Of Keycloak3.7LOWUser-Managed Access Bypass in Keycloak by Red Hat
CVE-2026-4636Red HatRed Hat Build Of Keycl...8.1HIGHDenial of Service Vulnerability in Keycloak Server by Red Hat
CVE-2026-4634Red HatRed Hat Build Of Keycl...7.5HIGHKeycloak Vulnerability in Single Use Object Provider Allows Unauthorized Access
CVE-2026-4325Red HatRed Hat Build Of Keycl...5.3MEDIUMKeycloak Vulnerability Allows Unauthorized Access and Privilege Escalation
CVE-2026-4282Red HatRed Hat Build Of Keycl...7.4HIGHPath Traversal Vulnerability in Keycloak by Red Hat
CVE-2026-3872Red HatRed Hat Build Of Keycl...7.3HIGHPrivilege Escalation Vulnerability in Keycloak by Red Hat
CVE-2026-3121Red HatRed Hat Build Of Keycl...6.5MEDIUMAccess Control Flaw in Keycloak Affects User-Managed Access API
CVE-2026-3190Red HatRed Hat Build Of Keycl...4.3MEDIUMServer-Side Request Forgery Vulnerability in Keycloak by Red Hat
CVE-2026-4874Red HatRed Hat Build Of Keycloak3.1LOWUser Enumeration Risk in Keycloak by Red Hat
CVE-2026-4633Red HatRed Hat Build Of Keycloak3.7LOWAccess Control Flaw in Keycloak's User-Managed Access Feature
CVE-2026-4628Red HatRed Hat Build Of Keycloak4.3MEDIUMHTTP Redirect Vulnerability in Keycloak Identity Management Solution by Red Hat
CVE-2026-4366Red HatRed Hat Build Of Keycloak5.8MEDIUMDenial of Service Vulnerability in Keycloak by Red Hat
CVE-2026-2575Red HatRed Hat Build Of Keycl...5.3MEDIUMSecurity Bypass Vulnerability in Keycloak Authentication Systems
CVE-2026-2603Red HatRed Hat Build Of Keycl...8.1HIGHSAML Assertion Validation Flaw in Keycloak by Red Hat
CVE-2026-2092Red HatRed Hat Build Of Keycl...7.7HIGHAuthorization Bypass Vulnerability in Keycloak Admin API
CVE-2026-2366Red HatRed Hat Build Of Keycl...3.1LOWVulnerability in Keycloak Account REST API Allows Account Takeover via MFA Manipulation
CVE-2026-3429Red HatRed Hat Build Of Keycl...4.2MEDIUMInformation Disclosure Vulnerability in Keycloak by Red Hat
CVE-2026-3911Red HatRed Hat Build Of Keycl...2.7LOWSecurity Flaw in Keycloak SAML Identity Provider Bypass
CVE-2026-3047Red HatRed Hat Build Of Keycl...8.8HIGHSecurity Flaw in Keycloak's IdentityBrokerService Allows Unauthorized Authentication
CVE-2026-3009Red HatRed Hat Build Of Keycl...8.1HIGHAccess Control Flaw in Keycloak Allows Unauthorized User Profile Modifications
CVE-2026-0871Red HatRed Hat Build Of Keycl...4.9MEDIUMAuthentication Token Vulnerability in Keycloak's Docker Registry Client
CVE-2026-2733Red HatRed Hat Build Of Keycl...3.8LOWSensitive Data Exposure in Keycloak Logging Configuration
CVE-2025-11537Red HatRed Hat Build Of Keycloak5MEDIUMBroken Access Control Vulnerability in Keycloak by Red Hat
CVE-2025-14778Red HatRed Hat Build Of Keycl...5.4MEDIUMKeycloak Vulnerability Allows Unauthorized Access via Invitation Token Manipulation
CVE-2026-1529Red HatRed Hat Build Of Keycl...📈👾🟡8.1HIGH