CVE-2024-8883

MEDIUM EXPLOITED NUCLEI

Redhat Build OF Keycloak < 22.0.13 - Open Redirect

Title source: rule

Description

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

Nuclei Templates (1)

Keycloak - Open Redirect
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: title:"keycloak"

Scores

CVSS v3 6.1
EPSS 0.0511
EPSS Percentile 89.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

VulnCheck KEV 2026-01-08
CWE
CWE-601
Status published
Products (50)
org.keycloak/keycloak-services 0 - 22.0.13Maven
Red Hat/Red Hat Build of Keycloak
Red Hat/Red Hat build of Keycloak 22 22.0.13-1
Red Hat/Red Hat build of Keycloak 22 22-18
Red Hat/Red Hat build of Keycloak 22 22-21
Red Hat/Red Hat build of Keycloak 24 24.0.8-1
Red Hat/Red Hat build of Keycloak 24 24-17
Red Hat/Red Hat JBoss Enterprise Application Platform 8
Red Hat/Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 0:0.1.0-2.redhat_00010.1.el8eap
Red Hat/Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 0:0.8.1-2.redhat_00001.1.el8eap
... and 40 more
Published Sep 19, 2024
Tracked Since Feb 18, 2026