CVE-2024-8883
MEDIUM EXPLOITED NUCLEIRedhat Build OF Keycloak < 22.0.13 - Open Redirect
Title source: ruleDescription
A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
Nuclei Templates (1)
Keycloak - Open Redirect
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
title:"keycloak"
Scores
CVSS v3
6.1
EPSS
0.0497
EPSS Percentile
89.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Exploitation Intel
VulnCheck KEV
2026-01-08
Classification
CWE
CWE-601
Status
published
Affected Products (12)
redhat/build_of_keycloak
redhat/openshift_container_platform
redhat/openshift_container_platform
redhat/openshift_container_platform_for_ibm_z
redhat/openshift_container_platform_for_ibm_z
redhat/openshift_container_platform_for_linuxone
redhat/openshift_container_platform_for_linuxone
redhat/openshift_container_platform_for_power
redhat/openshift_container_platform_for_power
redhat/single_sign-on
redhat/single_sign-on
org.keycloak/keycloak-services
< 22.0.13Maven
Timeline
Published
Sep 19, 2024
Tracked Since
Feb 18, 2026