Skip to content

Commit 4068293

Browse files
Merge pull request #6321 from github/julianladisch-GHSA-xmcw-mv9p-7pq2
2 parents ab05196 + 9c10f94 commit 4068293

File tree

1 file changed

+89
-3
lines changed

1 file changed

+89
-3
lines changed

advisories/unreviewed/2025/09/GHSA-xmcw-mv9p-7pq2/GHSA-xmcw-mv9p-7pq2.json

Lines changed: 89 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,110 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xmcw-mv9p-7pq2",
4-
"modified": "2025-09-22T18:30:31Z",
4+
"modified": "2025-09-22T18:30:32Z",
55
"published": "2025-09-05T21:32:38Z",
66
"aliases": [
77
"CVE-2025-10044"
88
],
9-
"details": "A flaw was found in Keycloak. Keycloak’s account console and other pages accept arbitrary text in the error_description query parameter. This text is directly rendered in error pages without validation or sanitization. While HTML encoding prevents XSS, an attacker can craft URLs with misleading messages (e.g., fake support phone numbers or URLs), which are displayed within the trusted Keycloak UI. This creates a phishing vector, potentially tricking users into contacting malicious actors.",
9+
"summary": "Keycloak error_description injection on error pages that can trigger phishing attacks",
10+
"details": "Keycloak’s account console accepts arbitrary text in the `error_description` query parameter. This text is directly rendered in error pages without validation or sanitization. While HTML encoding prevents XSS, an attacker can craft URLs with misleading messages (e.g., fake support phone numbers or URLs), which are displayed within the trusted Keycloak UI. This creates a phishing vector, potentially tricking users into contacting malicious actors.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-account-ui"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.2.9"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Maven",
40+
"name": "org.keycloak:keycloak-account-ui"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "26.3.0"
48+
},
49+
{
50+
"fixed": "26.3.4"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Maven",
59+
"name": "org.keycloak:keycloak-admin-ui"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "0"
67+
},
68+
{
69+
"fixed": "26.2.9"
70+
}
71+
]
72+
}
73+
]
74+
},
75+
{
76+
"package": {
77+
"ecosystem": "Maven",
78+
"name": "org.keycloak:keycloak-admin-ui"
79+
},
80+
"ranges": [
81+
{
82+
"type": "ECOSYSTEM",
83+
"events": [
84+
{
85+
"introduced": "26.3.0"
86+
},
87+
{
88+
"fixed": "26.3.4"
89+
}
90+
]
91+
}
92+
]
93+
}
94+
],
1795
"references": [
96+
{
97+
"type": "WEB",
98+
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-27gc-wj6x-9w55"
99+
},
18100
{
19101
"type": "ADVISORY",
20102
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10044"
21103
},
104+
{
105+
"type": "WEB",
106+
"url": "https://github.com/keycloak/keycloak/pull/42035"
107+
},
22108
{
23109
"type": "WEB",
24110
"url": "https://access.redhat.com/errata/RHSA-2025:16399"

0 commit comments

Comments
 (0)