@keycloak/keycloak-admin-client is vulnerable to Improper Authentication
20
Low Risk
Affected versions of this package are vulnerable to Credential Harvesting via Misconfigured Host/Port Settings, where an attacker with manage-realm permissions can exploit the email server configuration by modifying the host/port to point to a malicious server without needing to re-enter the existing credentials. The attacker can then harvest the stored credentials either by using the test connection feature or by triggering an email-sending workflow (e.g., password reset), causing Keycloak to authenticate with the attacker-controlled server and exposing the credentials.
You are affected if you are using a version that falls within the vulnerable range.
@keycloak/keycloak-admin-client is vulnerable to Improper Authentication in versions 12.0.0 - 26.2.4.
Upgrade the @keycloak/keycloak-admin-client library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant