Skip to content

Commit c8990dd

Browse files
1 parent 719f8cf commit c8990dd

2 files changed

Lines changed: 31 additions & 6 deletions

File tree

advisories/unreviewed/2026/03/GHSA-22rm-wp4x-v5cx/GHSA-22rm-wp4x-v5cx.json renamed to advisories/github-reviewed/2026/03/GHSA-22rm-wp4x-v5cx/GHSA-22rm-wp4x-v5cx.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-22rm-wp4x-v5cx",
4-
"modified": "2026-03-26T09:30:28Z",
4+
"modified": "2026-03-27T20:03:17Z",
55
"published": "2026-03-26T09:30:28Z",
66
"aliases": [
77
"CVE-2026-4874"
88
],
9+
"summary": "Keycloak Server-Side Request Forgery via OIDC token endpoint manipulation",
910
"details": "A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "26.5.6"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -26,15 +47,19 @@
2647
{
2748
"type": "WEB",
2849
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451611"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/keycloak/keycloak"
2954
}
3055
],
3156
"database_specific": {
3257
"cwe_ids": [
3358
"CWE-918"
3459
],
3560
"severity": "LOW",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-03-27T20:03:17Z",
3863
"nvd_published_at": "2026-03-26T08:16:22Z"
3964
}
4065
}

advisories/github-reviewed/2026/03/GHSA-rwcr-rpcc-3g9m/GHSA-rwcr-rpcc-3g9m.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rwcr-rpcc-3g9m",
4-
"modified": "2026-03-26T18:23:01Z",
4+
"modified": "2026-03-27T20:00:41Z",
55
"published": "2026-03-26T18:23:01Z",
66
"aliases": [
77
"CVE-2026-33872"
88
],
9-
"summary": "Ielixir-nodejs has Cross-User Data Leakage or Information Disclosure due to Worker Protocol Race Condition",
9+
"summary": "elixir-nodejs has Cross-User Data Leakage or Information Disclosure due to Worker Protocol Race Condition",
1010
"details": "### Impact\n\nThis vulnerability results in Cross-User Data Leakage or Information Disclosure due to a race condition in the worker protocol.\n\nThe lack of request-response correlation creates a \"stale response\" vulnerability. Because the worker does not verify which request a response belongs to, it may return the next available data in the buffer to an unrelated caller.\n\nIn high-throughput environments where the library processes sensitive user data (e.g., PII, authentication tokens, or private records), a timeout or high concurrent load can cause Data A (belonging to User A) to be returned to User B.\n\nThis may lead to unauthorized information disclosure that is difficult to trace, as the application may not throw an error but instead provide \"valid-looking\" yet entirely incorrect and private data to the wrong session.\n\n### Patches\n\nfixed in v3.1.4\n\n### Resources\nhttps://github.com/revelrylabs/elixir-nodejs/issues/100\n\nhttps://github.com/revelrylabs/elixir-nodejs/pull/105",
1111
"severity": [
1212
{

0 commit comments

Comments
 (0)