Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1164 | A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance. |
Github GHSA |
GHSA-8rmm-gm28-pj8q | Keycloak Cross-site Scripting (XSS) via assertion consumer service URL in SAML POST-binding flow |
Wed, 18 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:quarkus:3 |
Thu, 19 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Aug 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 29 Aug 2024 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13 |
Subscriptions
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-30T14:16:16.751Z
Reserved: 2023-12-12T07:30:43.924Z
Link: CVE-2023-6717
Updated: 2024-08-02T08:35:14.887Z
Status : Deferred
Published: 2024-04-25T16:15:10.653
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-6717
OpenCVE Enrichment
No data.
EUVD
Github GHSA