Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7vw6-5q2f-7w5r

Опубликовано: 20 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 5.8

Описание

Keycloak’s OpenID Connect Dynamic Client Registration feature affected by Server-Side Request Forgery (SSRF)

A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the destination. This enables attackers to coerce the Keycloak server into making HTTP requests to internal or restricted network resources. As a result, attackers can probe internal services and cloud metadata endpoints, creating an information disclosure and reconnaissance risk.

Пакеты

Наименование

org.keycloak:keycloak-adapter-core

maven
Затронутые версииВерсия исправления

<= 25.0.3

Отсутствует

EPSS

Процентиль: 11%
0.00037
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 5.8
nvd
18 дней назад

A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the destination. This enables attackers to coerce the Keycloak server into making HTTP requests to internal or restricted network resources. As a result, attackers can probe internal services and cloud metadata endpoints, creating an information disclosure and reconnaissance risk.

CVSS3: 5.8
debian
18 дней назад

A flaw was identified in Keycloak\u2019s OpenID Connect Dynamic Client ...

EPSS

Процентиль: 11%
0.00037
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-918