Loading HuntDB...

GHSA-5545-r4hg-rj4m

GitHub Security Advisory

Keycloak Path Traversal Vulnerability Due to External Control of File Name or Path

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.

Affected Packages

Maven org.keycloak:keycloak-quarkus-server
Affected versions: 0 (fixed in 26.0.6)
Maven org.keycloak:keycloak-quarkus-server
Affected versions: 25.0.0 (fixed in 26.0.6)

Related CVEs

Key Information

GHSA ID
GHSA-5545-r4hg-rj4m
Published
November 25, 2024 6:37 PM
Last Modified
November 25, 2024 6:37 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.keycloak:keycloak-quarkus-server
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 26, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.