Loading HuntDB...

GHSA-w9mf-83w3-fv49

GitHub Security Advisory

Keycloak vulnerable to Stored Cross site Scripting (XSS) when loading default roles

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (18.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the default roles functionality.

### CVSS 3.1 - **3.8**

**Vector String:** AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

**Vector Clarification:**

* User interaction is not required as the admin console is regularly used during an administrator's work
* The scope is unchanged since the admin console web application is both the vulnerable component and where the exploit executes

### Credits

Aytaç Kalıncı, Ilker Bulgurcu, Yasin Yılmaz (@aytackalinci, @smileronin, @yasinyilmaz) - NETAŞ PENTEST TEAM

Affected Packages

Maven org.keycloak:keycloak-parent
Affected versions: 0 (fixed in 19.0.2)

Related CVEs

Key Information

GHSA ID
GHSA-w9mf-83w3-fv49
Published
September 23, 2022 4:32 PM
Last Modified
October 18, 2022 5:19 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.keycloak:keycloak-parent
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 31, 2025 6:36 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.