CVE-2024-8883
MEDIUM EXPLOITED NUCLEIRedhat Build OF Keycloak < 22.0.13 - Open Redirect
Title source: ruleDescription
A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
Nuclei Templates (1)
Keycloak - Open Redirect
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
title:"keycloak"
Scores
CVSS v3
6.1
EPSS
0.0511
EPSS Percentile
89.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
VulnCheck KEV
2026-01-08
CWE
CWE-601
Status
published
Products (50)
org.keycloak/keycloak-services
0 - 22.0.13Maven
Red Hat/Red Hat Build of Keycloak
Red Hat/Red Hat build of Keycloak 22
22.0.13-1
Red Hat/Red Hat build of Keycloak 22
22-18
Red Hat/Red Hat build of Keycloak 22
22-21
Red Hat/Red Hat build of Keycloak 24
24.0.8-1
Red Hat/Red Hat build of Keycloak 24
24-17
Red Hat/Red Hat JBoss Enterprise Application Platform 8
Red Hat/Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
0:0.1.0-2.redhat_00010.1.el8eap
Red Hat/Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
0:0.8.1-2.redhat_00001.1.el8eap
... and 40 more
Published
Sep 19, 2024
Tracked Since
Feb 18, 2026