Description
A flaw was found in Keycloak, specifically in the organization selection login page. A remote attacker with `manage-realm` or `manage-organizations` administrative privileges can exploit a Stored Cross-Site Scripting (XSS) vulnerability. This flaw occurs because the `organization.alias` is placed into an inline JavaScript `onclick` handler, allowing a crafted JavaScript payload to execute in a user's browser when they view the login page. Successful exploitation enables arbitrary JavaScript execution, potentially leading to session theft, unauthorized account actions, or further attacks against users of the affected realm.
Published: 2026-04-14
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: Arbitrary Code Execution via Stored XSS
Action: Restrict Access
AI Analysis

Impact

A flaw was found in Keycloak’s organization selection login page. An attacker who has manage-realm or manage-organizations privileges can inject a crafted JavaScript payload because the organization.alias value is inserted directly into an inline onclick handler. When a user visits the login page the payload runs in their browser, allowing arbitrary script execution and enabling session theft, unauthorized account actions, or further attacks against users of the affected realm.

Affected Systems

Red Hat Build of Keycloak is affected. No specific version information is provided in the advisory.

Risk and Exploitability

The CVSS base score is 6.9, indicating a moderate risk. Exploitation requires the attacker to possess privileged administrative permissions and to create a malicious organization alias. The vulnerability is not listed in the CISA KEV catalog and no EPSS score is available, suggesting the public exploit landscape is currently limited. Nevertheless, because arbitrary JavaScript can be executed in logged‑in users, the potential impact on confidentiality, integrity, and availability is significant for systems that rely on Keycloak for authentication.

Generated by OpenCVE AI on April 14, 2026 at 16:35 UTC.

Remediation

Vendor Workaround

Restrict access to the Keycloak administration console and login pages to trusted networks only, ideally through a VPN or by configuring firewall rules. Furthermore, ensure that only highly trusted administrators are granted `manage-realm` or `manage-organizations` privileges within Keycloak. Regularly review and audit administrative accounts and their assigned roles to minimize the risk of unauthorized access and exploitation. If the Keycloak service is restarted or reloaded, these network and access restrictions will persist.


OpenCVE Recommended Actions

  • Apply the latest Red Hat build of Keycloak that contains the CVE-2026-37980 fix.
  • Restrict access to the Keycloak administration console and login pages to trusted networks only, ideally through a VPN or firewall rules.
  • Ensure that only highly trusted administrators are granted manage-realm or manage-organizations privileges within Keycloak.
  • Regularly review and audit administrative accounts and their assigned roles to minimize risk.

Generated by OpenCVE AI on April 14, 2026 at 16:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keycloak, specifically in the organization selection login page. A remote attacker with `manage-realm` or `manage-organizations` administrative privileges can exploit a Stored Cross-Site Scripting (XSS) vulnerability. This flaw occurs because the `organization.alias` is placed into an inline JavaScript `onclick` handler, allowing a crafted JavaScript payload to execute in a user's browser when they view the login page. Successful exploitation enables arbitrary JavaScript execution, potentially leading to session theft, unauthorized account actions, or further attacks against users of the affected realm.
Title Org.keycloak.forms.login: keycloak: keycloak: arbitrary code execution via stored cross-site scripting (xss) in organization selection login page
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-79
CPEs cpe:/a:redhat:build_keycloak:
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics cvssV3_1

{'score': 6.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}


Subscriptions

Redhat Build Keycloak
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-14T15:43:02.647Z

Reserved: 2026-04-06T07:48:39.722Z

Link: CVE-2026-37980

cve-icon Vulnrichment

Updated: 2026-04-14T15:42:53.829Z

cve-icon NVD

Status : Received

Published: 2026-04-14T15:16:34.230

Modified: 2026-04-14T15:16:34.230

Link: CVE-2026-37980

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-06T12:34:00Z

Links: CVE-2026-37980 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:37:16Z

Weaknesses