Total vulnerabilities in the database
A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.
Software | From | Fixed in |
---|---|---|
redhat / keycloak | - | 13.0.0 |
![]() |
- | 13.0.0 |