Skip to content

Commit f5c34c7

Browse files
1 parent f551188 commit f5c34c7

2 files changed

Lines changed: 69 additions & 9 deletions

File tree

advisories/unreviewed/2026/01/GHSA-m2w5-7xhv-w6fh/GHSA-m2w5-7xhv-w6fh.json renamed to advisories/github-reviewed/2026/01/GHSA-m2w5-7xhv-w6fh/GHSA-m2w5-7xhv-w6fh.json

Lines changed: 33 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,69 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m2w5-7xhv-w6fh",
4-
"modified": "2026-01-21T06:31:20Z",
4+
"modified": "2026-01-21T22:29:46Z",
55
"published": "2026-01-21T06:31:20Z",
66
"aliases": [
77
"CVE-2026-1035"
88
],
9+
"summary": "Keycloak does not validate and update refresh token usage atomically",
910
"details": "A flaw was found in the Keycloak server during refresh token processing, specifically in the TokenManager class responsible for enforcing refresh token reuse policies. When strict refresh token rotation is enabled, the validation and update of refresh token usage are not performed atomically. This allows concurrent refresh requests to bypass single-use enforcement and issue multiple access tokens from the same refresh token. As a result, Keycloak’s refresh token rotation hardening can be undermined.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "26.2.5"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1035"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/45647"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://access.redhat.com/security/cve/CVE-2026-1035"
2550
},
2651
{
2752
"type": "WEB",
2853
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430314"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/keycloak/keycloak"
2958
}
3059
],
3160
"database_specific": {
3261
"cwe_ids": [
3362
"CWE-367"
3463
],
3564
"severity": "LOW",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-01-21T22:29:46Z",
3867
"nvd_published_at": "2026-01-21T06:15:46Z"
3968
}
4069
}

advisories/unreviewed/2026/01/GHSA-wv3h-x6c4-r867/GHSA-wv3h-x6c4-r867.json renamed to advisories/github-reviewed/2026/01/GHSA-wv3h-x6c4-r867/GHSA-wv3h-x6c4-r867.json

Lines changed: 36 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,69 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wv3h-x6c4-r867",
4-
"modified": "2026-01-21T09:31:30Z",
4+
"modified": "2026-01-21T22:30:24Z",
55
"published": "2026-01-21T09:31:30Z",
66
"aliases": [
77
"CVE-2025-14559"
88
],
9+
"summary": "Keycloak services allows the issuance of access and refresh tokens for disabled users",
910
"details": "A flaw was found in the keycloak-services component of Keycloak. This vulnerability allows the issuance of access and refresh tokens for disabled users, leading to unauthorized use of previously revoked privileges, via a business logic vulnerability in the Token Exchange implementation when a privileged client invokes the token exchange flow.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "26.5.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14559"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/45651"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://access.redhat.com/security/cve/CVE-2025-14559"
2550
},
2651
{
2752
"type": "WEB",
2853
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421711"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/keycloak/keycloak"
2958
}
3059
],
3160
"database_specific": {
32-
"cwe_ids": [],
61+
"cwe_ids": [
62+
"CWE-863"
63+
],
3364
"severity": "MODERATE",
34-
"github_reviewed": false,
35-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-01-21T22:30:24Z",
3667
"nvd_published_at": "2026-01-21T07:16:00Z"
3768
}
3869
}

0 commit comments

Comments
 (0)