A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure.
| Vendor | Product | Versions |
|---|---|---|
| red hat | keycloak | maven/org.keycloak:keycloak-services: < 26.5.7 |
Updated severity to HIGH, CVSS estimate to 5.3, marked as actively exploited, and noted that no exploit is available.
Initial creation