A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-0318 | A flaw was found in Keycloak. This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134. |
![]() |
GHSA-9vm7-v8wj-3fqw | keycloak-core: open redirect via "form_post.jwt" JARM response mode |
Fixes
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-09T23:59:58.241Z
Reserved: 2023-12-18T15:44:40.245Z
Link: CVE-2023-6927

No data.

Status : Modified
Published: 2023-12-18T23:15:10.027
Modified: 2024-11-21T08:44:51.110
Link: CVE-2023-6927


No data.