Skip to content

Commit 7f3b97a

Browse files
1 parent 3c81cbf commit 7f3b97a

File tree

2 files changed

+74
-8
lines changed

2 files changed

+74
-8
lines changed

advisories/unreviewed/2026/04/GHSA-cjm2-j6cm-6p6m/GHSA-cjm2-j6cm-6p6m.json renamed to advisories/github-reviewed/2026/04/GHSA-cjm2-j6cm-6p6m/GHSA-cjm2-j6cm-6p6m.json

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,53 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cjm2-j6cm-6p6m",
4-
"modified": "2026-04-02T18:31:37Z",
4+
"modified": "2026-04-04T05:59:35Z",
55
"published": "2026-04-02T15:31:38Z",
66
"aliases": [
77
"CVE-2026-3872"
88
],
9+
"summary": "Keycloak: Redirect URI validation bypass via ..;/ path traversal in OIDC auth endpoint",
910
"details": "A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.5.7"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-3872"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/47718"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/keycloak/keycloak/commit/35a71b00bc856ac402711130f60190d3a24795e7"
50+
},
2251
{
2352
"type": "WEB",
2453
"url": "https://access.redhat.com/errata/RHSA-2026:6475"
@@ -42,15 +71,19 @@
4271
{
4372
"type": "WEB",
4473
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445988"
74+
},
75+
{
76+
"type": "PACKAGE",
77+
"url": "https://github.com/keycloak/keycloak"
4578
}
4679
],
4780
"database_specific": {
4881
"cwe_ids": [
4982
"CWE-601"
5083
],
5184
"severity": "HIGH",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
85+
"github_reviewed": true,
86+
"github_reviewed_at": "2026-04-04T05:59:35Z",
5487
"nvd_published_at": "2026-04-02T13:16:26Z"
5588
}
5689
}

advisories/unreviewed/2026/04/GHSA-rx66-hj7g-28h7/GHSA-rx66-hj7g-28h7.json renamed to advisories/github-reviewed/2026/04/GHSA-rx66-hj7g-28h7/GHSA-rx66-hj7g-28h7.json

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,53 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rx66-hj7g-28h7",
4-
"modified": "2026-04-02T18:31:37Z",
4+
"modified": "2026-04-04T05:58:45Z",
55
"published": "2026-04-02T15:31:39Z",
66
"aliases": [
77
"CVE-2026-4325"
88
],
9+
"summary": "Keycloak: Replay of action tokens via improper handling of single-use entries",
910
"details": "A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an attacker to delete arbitrary single-use entries, which can enable the replay of consumed action tokens, such as password reset links. This could lead to unauthorized access or account compromise.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.5.7"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4325"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/47715"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/keycloak/keycloak/commit/9046f201125a6fd6be9c116b99d348509d99d4a5"
50+
},
2251
{
2352
"type": "WEB",
2453
"url": "https://access.redhat.com/errata/RHSA-2026:6475"
@@ -42,15 +71,19 @@
4271
{
4372
"type": "WEB",
4473
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448351"
74+
},
75+
{
76+
"type": "PACKAGE",
77+
"url": "https://github.com/keycloak/keycloak"
4578
}
4679
],
4780
"database_specific": {
4881
"cwe_ids": [
4982
"CWE-653"
5083
],
5184
"severity": "MODERATE",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
85+
"github_reviewed": true,
86+
"github_reviewed_at": "2026-04-04T05:58:45Z",
5487
"nvd_published_at": "2026-04-02T13:16:26Z"
5588
}
5689
}

0 commit comments

Comments
 (0)