Description
A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.
Published: 2023-01-11
Score: 3.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-0552 A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.
Github GHSA Github GHSA GHSA-v436-q368-hvgg Keycloak has lack of validation of access token on client registrations endpoint
History

Wed, 09 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Redhat Keycloak Red Hat Single Sign On Rhosemc Single Sign-on
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-04-09T14:09:36.362Z

Reserved: 2023-01-05T20:27:38.369Z

Link: CVE-2023-0091

cve-icon Vulnrichment

Updated: 2024-08-02T05:02:43.399Z

cve-icon NVD

Status : Modified

Published: 2023-01-13T06:15:11.930

Modified: 2025-04-09T15:15:56.113

Link: CVE-2023-0091

cve-icon Redhat

Severity : Low

Publid Date: 2022-10-28T00:00:00Z

Links: CVE-2023-0091 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses