296,663
Total vulnerabilities in the database
Keycloak’s account console accepts arbitrary text in the error_description
query parameter. This text is directly rendered in error pages without validation or sanitization. While HTML encoding prevents XSS, an attacker can craft URLs with misleading messages (e.g., fake support phone numbers or URLs), which are displayed within the trusted Keycloak UI. This creates a phishing vector, potentially tricking users into contacting malicious actors.
Software | From | Fixed in |
---|---|---|
![]() |
- | 26.2.9 |
![]() |
26.3.0 | 26.3.4 |
![]() |
- | 26.2.9 |
![]() |
26.3.0 | 26.3.4 |