GHSA-w9mf-83w3-fv49
GitHub Security Advisory
Keycloak vulnerable to Stored Cross site Scripting (XSS) when loading default roles
Advisory Details
A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (18.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the default roles functionality.
### CVSS 3.1 - **3.8**
**Vector String:** AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
**Vector Clarification:**
* User interaction is not required as the admin console is regularly used during an administrator's work
* The scope is unchanged since the admin console web application is both the vulnerable component and where the exploit executes
### Credits
Aytaç Kalıncı, Ilker Bulgurcu, Yasin Yılmaz (@aytackalinci, @smileronin, @yasinyilmaz) - NETAŞ PENTEST TEAM
Affected Packages
Related CVEs
Key Information
Dataset
Data from GitHub Advisory Database. This information is provided for research and educational purposes.