Keycloak Cross-Site Scripting Vulnerability CVSS 6.9 (Medium)
Summary
CERT-Bund has published a security advisory regarding a Cross-Site Scripting (XSS) vulnerability in Keycloak, an open-source identity and access management platform. The vulnerability has a CVSS Base Score of 6.9 (Medium) and CVSS Temporal Score of 6.3 (Medium). A remote, authenticated attacker can exploit this vulnerability to conduct XSS attacks. Affected systems run Keycloak on Linux and UNIX operating systems.
What changed
CERT-Bund published a security advisory on 14 April 2026 regarding a Cross-Site Scripting vulnerability in Keycloak, an open-source Single Sign-On and Identity and Access Management solution. The vulnerability affects Linux and UNIX environments and carries a CVSS Base Score of 6.9 (Medium) with a Temporal Score of 6.3. The vulnerability allows a remote, authenticated attacker to conduct XSS attacks.
Organizations running Keycloak on Linux or UNIX systems should prioritize assessment of their deployments, monitor for available patches from Keycloak maintainers, and implement temporary workarounds such as input sanitization or network-level restrictions until patches are available. Security teams should include Keycloak instances in vulnerability management scanning and ensure incident response procedures account for potential XSS exploitation scenarios.
What to do next
- Identify if your organization runs Keycloak on Linux or UNIX systems
- Apply available patches for Keycloak XSS vulnerability when released
- Implement temporary mitigations if patches are not yet available
Archived snapshot
Apr 15, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1105] Keycloak: Schwachstelle ermöglicht Cross-Site Scripting CVSS Base Score 6.9 (mittel) CVSS Temporal Score 6.3 (mittel) Remoteangriff ja Datum 14.04.2026 Stand 15.04.2026 Mitigation nein
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
Produktbeschreibung
Keycloak ermöglicht Single Sign-On mit Identity and Access Management für moderne Anwendungen und Dienste.
Produkte
14.04.2026
- Open Source Keycloak
Angriff
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Keycloak ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.