Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7628 | keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field. |
Github GHSA |
GHSA-g8q8-fggx-9r3q | Keycloak vulnerable to path traversal via double URL encoding |
Wed, 09 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-09T13:42:27.268Z
Reserved: 2022-10-31T20:17:27.732Z
Link: CVE-2022-3782
Updated: 2024-08-03T01:20:57.802Z
Status : Modified
Published: 2023-01-13T06:15:11.187
Modified: 2025-04-09T14:15:24.100
Link: CVE-2022-3782
OpenCVE Enrichment
No data.
EUVD
Github GHSA