Red Hat Keycloak Vulnerabilities
Red%20hat Keycloak vulnerabilities.
Vulnerability Published:
🗓️ Published
- Anytime
Sort By:
🗓️ Published Date
- Descending
HTTP Redirect Vulnerability in Keycloak Identity Management Solution by Red Hat
CVE-2026-4366Red HatRed Hat Build Of Keycloak5.8MEDIUMDenial of Service Vulnerability in Keycloak by Red Hat
CVE-2026-2575Red HatRed Hat Build Of Keycl...5.3MEDIUMSecurity Bypass Vulnerability in Keycloak Authentication Systems
CVE-2026-2603Red HatRed Hat Build Of Keycl...8.1HIGHSAML Assertion Validation Flaw in Keycloak by Red Hat
CVE-2026-2092Red HatRed Hat Build Of Keycl...7.7HIGHAuthorization Bypass Vulnerability in Keycloak Admin API
CVE-2026-2366Red HatRed Hat Build Of Keycloak3.1LOWVulnerability in Keycloak Account REST API Allows Account Takeover via MFA Manipulation
CVE-2026-3429Red HatRed Hat Build Of Keycloak4.2MEDIUMInformation Disclosure Vulnerability in Keycloak by Red Hat
CVE-2026-3911Red HatRed Hat Build Of Keycloak2.7LOWSecurity Flaw in Keycloak SAML Identity Provider Bypass
CVE-2026-3047Red HatRed Hat Build Of Keycl...8.8HIGHSecurity Flaw in Keycloak's IdentityBrokerService Allows Unauthorized Authentication
CVE-2026-3009Red HatRed Hat Build Of Keycl...8.1HIGHAccess Control Flaw in Keycloak Allows Unauthorized User Profile Modifications
CVE-2026-0871Red HatRed Hat Build Of Keycl...4.9MEDIUMAuthentication Token Vulnerability in Keycloak's Docker Registry Client
CVE-2026-2733Red HatRed Hat Build Of Keycl...3.8LOWSensitive Data Exposure in Keycloak Logging Configuration
CVE-2025-11537Red HatRed Hat Build Of Keycloak5MEDIUMBroken Access Control Vulnerability in Keycloak by Red Hat
CVE-2025-14778Red HatRed Hat Build Of Keycl...5.4MEDIUMKeycloak Vulnerability Allows Unauthorized Access via Invitation Token Manipulation
CVE-2026-1529Red HatRed Hat Build Of Keycl...📈👾🟡8.1HIGHAuthentication Bypass in Keycloak Affects Token Issuance
CVE-2026-1486Red HatRed Hat Build Of Keycl...8.8HIGHSecurity Flaw in Keycloak's CIBA Feature Affects Internal Service Requests
CVE-2026-1518Red HatRed Hat Build Of Keycloak2.7LOWPrivilege Escalation Vulnerability in Keycloak Admin API by Red Hat
CVE-2025-13881Red HatRed Hat Build Of Keycl...2.7LOWDenial-of-Service Vulnerability in Undertow by Red Hat
CVE-2024-4027Red HatOpenshift Serverless7.5HIGHSAML Brokering Flaw in Keycloak Affects Session Validity
CVE-2026-1190Red HatRed Hat Build Of Keycl...3.1LOWAccess Control Flaw in Keycloak Admin REST API by Red Hat
CVE-2025-14083Red HatRed Hat Build Of Keycloak2.7LOWBusiness Logic Vulnerability in Keycloak's Token Exchange Component
CVE-2025-14559Red HatRed Hat Build Of Keycl...6.5MEDIUMToken Management Flaw in Keycloak Server by Red Hat
CVE-2026-1035Red HatRed Hat Build Of Keycloak3.1LOWArbitrary Jwks_uri Vulnerability in Keycloak's OpenID Connect Dynamic Client Registration
CVE-2026-1180Red HatRed Hat Build Of Keycloak5.8MEDIUMImproper Input Validation in Keycloak by Red Hat
CVE-2026-0976Red HatRed Hat Build Of Keycloak3.7LOWVulnerability in Keycloak's Authorization Header Parser Affects Authentication Security
CVE-2026-0707Red HatRed Hat Build Of Keycl...5.3MEDIUM