Skip to content

Commit 9c10f94

Browse files
committed
1 parent ab05196 commit 9c10f94

File tree

1 file changed

+89
-3
lines changed

1 file changed

+89
-3
lines changed

advisories/unreviewed/2025/09/GHSA-xmcw-mv9p-7pq2/GHSA-xmcw-mv9p-7pq2.json

Lines changed: 89 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,110 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xmcw-mv9p-7pq2",
4-
"modified": "2025-09-22T18:30:31Z",
4+
"modified": "2025-09-22T18:30:32Z",
55
"published": "2025-09-05T21:32:38Z",
66
"aliases": [
77
"CVE-2025-10044"
88
],
9-
"details": "A flaw was found in Keycloak. Keycloak’s account console and other pages accept arbitrary text in the error_description query parameter. This text is directly rendered in error pages without validation or sanitization. While HTML encoding prevents XSS, an attacker can craft URLs with misleading messages (e.g., fake support phone numbers or URLs), which are displayed within the trusted Keycloak UI. This creates a phishing vector, potentially tricking users into contacting malicious actors.",
9+
"summary": "Keycloak error_description injection on error pages that can trigger phishing attacks",
10+
"details": "Keycloak’s account console accepts arbitrary text in the `error_description` query parameter. This text is directly rendered in error pages without validation or sanitization. While HTML encoding prevents XSS, an attacker can craft URLs with misleading messages (e.g., fake support phone numbers or URLs), which are displayed within the trusted Keycloak UI. This creates a phishing vector, potentially tricking users into contacting malicious actors.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-account-ui"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.2.9"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Maven",
40+
"name": "org.keycloak:keycloak-account-ui"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "26.3.0"
48+
},
49+
{
50+
"fixed": "26.3.4"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Maven",
59+
"name": "org.keycloak:keycloak-admin-ui"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "0"
67+
},
68+
{
69+
"fixed": "26.2.9"
70+
}
71+
]
72+
}
73+
]
74+
},
75+
{
76+
"package": {
77+
"ecosystem": "Maven",
78+
"name": "org.keycloak:keycloak-admin-ui"
79+
},
80+
"ranges": [
81+
{
82+
"type": "ECOSYSTEM",
83+
"events": [
84+
{
85+
"introduced": "26.3.0"
86+
},
87+
{
88+
"fixed": "26.3.4"
89+
}
90+
]
91+
}
92+
]
93+
}
94+
],
1795
"references": [
96+
{
97+
"type": "WEB",
98+
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-27gc-wj6x-9w55"
99+
},
18100
{
19101
"type": "ADVISORY",
20102
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10044"
21103
},
104+
{
105+
"type": "WEB",
106+
"url": "https://github.com/keycloak/keycloak/pull/42035"
107+
},
22108
{
23109
"type": "WEB",
24110
"url": "https://access.redhat.com/errata/RHSA-2025:16399"

0 commit comments

Comments
 (0)