Loading HuntDB...

GHSA-rpj2-w6fr-79hc

GitHub Security Advisory

Keycloak vulnerable to Improper Certificate Validation

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

keycloak accepts an expired certificate by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.

This issue was partially fixed in version [13.0.1](https://github.com/keycloak/keycloak/pull/6330) and more completely fixed in version [14.0.0](https://github.com/keycloak/keycloak/pull/8067).

Affected Packages

Maven org.keycloak:keycloak-core
Affected versions: 0 (fixed in 14.0.0)

Related CVEs

Key Information

GHSA ID
GHSA-rpj2-w6fr-79hc
Published
August 24, 2022 12:00 AM
Last Modified
December 5, 2022 11:03 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.keycloak:keycloak-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 15, 2025 6:24 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.