Skip to content

Commit 67535bb

Browse files
1 parent ac9538a commit 67535bb

1 file changed

Lines changed: 33 additions & 4 deletions

File tree

advisories/unreviewed/2026/01/GHSA-7vw6-5q2f-7w5r/GHSA-7vw6-5q2f-7w5r.json renamed to advisories/github-reviewed/2026/01/GHSA-7vw6-5q2f-7w5r/GHSA-7vw6-5q2f-7w5r.json

Lines changed: 33 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,69 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7vw6-5q2f-7w5r",
4-
"modified": "2026-01-20T15:33:12Z",
4+
"modified": "2026-01-21T21:55:11Z",
55
"published": "2026-01-20T15:33:12Z",
66
"aliases": [
77
"CVE-2026-1180"
88
],
9+
"summary": " Keycloak’s OpenID Connect Dynamic Client Registration feature affected by Server-Side Request Forgery (SSRF)",
910
"details": "A flaw was identified in Keycloak’s OpenID Connect Dynamic Client Registration feature when clients authenticate using private_key_jwt. The issue allows a client to specify an arbitrary jwks_uri, which Keycloak then retrieves without validating the destination. This enables attackers to coerce the Keycloak server into making HTTP requests to internal or restricted network resources. As a result, attackers can probe internal services and cloud metadata endpoints, creating an information disclosure and reconnaissance risk.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-adapter-core"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "25.0.3"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1180"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/45645"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://access.redhat.com/security/cve/CVE-2026-1180"
2550
},
2651
{
2752
"type": "WEB",
2853
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430781"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/keycloak/keycloak"
2958
}
3059
],
3160
"database_specific": {
3261
"cwe_ids": [
3362
"CWE-918"
3463
],
3564
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-01-21T21:55:11Z",
3867
"nvd_published_at": "2026-01-20T13:16:03Z"
3968
}
4069
}

0 commit comments

Comments
 (0)