GHSA-5545-r4hg-rj4m
GitHub Security Advisory
Keycloak Path Traversal Vulnerability Due to External Control of File Name or Path
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.
Affected Packages
Maven
org.keycloak:keycloak-quarkus-server
Affected versions:
0
(fixed in 26.0.6)
Maven
org.keycloak:keycloak-quarkus-server
Affected versions:
25.0.0
(fixed in 26.0.6)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: July 26, 2025 6:37 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.