CVE-2024-8883

MEDIUM EXPLOITED NUCLEI

Redhat Build OF Keycloak < 22.0.13 - Open Redirect

Title source: rule

Description

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

Nuclei Templates (1)

Keycloak - Open Redirect
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: title:"keycloak"

Scores

CVSS v3 6.1
EPSS 0.0497
EPSS Percentile 89.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploitation Intel

VulnCheck KEV 2026-01-08

Classification

CWE
CWE-601
Status published

Affected Products (12)

redhat/build_of_keycloak
redhat/openshift_container_platform
redhat/openshift_container_platform
redhat/openshift_container_platform_for_ibm_z
redhat/openshift_container_platform_for_ibm_z
redhat/openshift_container_platform_for_linuxone
redhat/openshift_container_platform_for_linuxone
redhat/openshift_container_platform_for_power
redhat/openshift_container_platform_for_power
redhat/single_sign-on
redhat/single_sign-on
org.keycloak/keycloak-services < 22.0.13Maven

Timeline

Published Sep 19, 2024
Tracked Since Feb 18, 2026