Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3012 articles · 110772 vulns · 36/41 feeds (7d)
← Back to list
6.9
CVE-2026-37980
red hat · red hat build of keycloak

Org.keycloak.forms.login: keycloak: keycloak: arbitrary code execution via stored cross-site scripting (xss) in organization selection login page

Description

A flaw was found in Keycloak, specifically in the organization selection login page. A remote attacker with `manage-realm` or `manage-organizations` administrative privileges can exploit a Stored Cross-Site Scripting (XSS) vulnerability. This flaw occurs because the `organization.alias` is placed into an inline JavaScript `onclick` handler, allowing a crafted JavaScript payload to execute in a user's browser when they view the login page. Successful exploitation enables arbitrary JavaScript execution, potentially leading to session theft, unauthorized account actions, or further attacks against users of the affected realm.

Affected Products

VendorProductVersions
red hatred hat build of keycloak—

References

  • https://access.redhat.com/security/cve/CVE-2026-37980(vdb-entry, x_refsource_REDHAT)
  • https://bugzilla.redhat.com/show_bug.cgi?id=2455325(issue-tracking, x_refsource_REDHAT)

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2026-37980 | Red Hat Keycloak organization.alias cross site scripting
→ No new info (linked only)
CVSS 3.16.9 NONE
CISA KEV❌ No
Actively exploited❌ No
CWECWE-79
PublishedApr 14, 2026
Last enriched4h ago
Trending Score20
Source articles1
Independent1
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

NONECVE-2026-5483
Odh-dashboard: odh dashboard kubernetes service account exposure
Trending: 32
HIGHCVE-2026-4634EXP
Keycloak: keycloak: denial of service via excessive processing of openid connect scope parameters
Trending: 22
HIGHCVE-2026-4636EXP
Keycloak: keycloak: uma policy bypass allows authenticated users to gain unauthorized access to victim-owned resources.
Trending: 21
NONECVE-2025-57847
Ansible-automation-platform: privilege escalation via excessive group writable /etc/passwd permissions
Trending: 19
NONECVE-2025-57853
Web-terminal: privilege escalation via excessive /etc/passwd permissions
Trending: 19

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 14, 2026
Discovered by ZDM
Apr 14, 2026