Description
A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m4fv-gm5m-4725 | HTML Injection in Keycloak Admin REST API |
References
History
No history.
Subscriptions
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Keycloak
Subscribe
Openshift Container Platform
Subscribe
Red Hat Single Sign On
Subscribe
Rhosemc
Subscribe
Single Sign-on
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T23:55:24.548Z
Reserved: 2022-04-08T00:00:00.000Z
Link: CVE-2022-1274
No data.
Status : Modified
Published: 2023-03-29T21:15:07.853
Modified: 2024-11-21T06:40:23.330
Link: CVE-2022-1274
OpenCVE Enrichment
No data.
Github GHSA