
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled (NVD, GitHub Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The flaw is categorized as CWE-863 (Incorrect Authorization) and affects the keycloak-services Java package (NVD).
This vulnerability allows an attacker with any existing user account to bypass authorization controls and create new default user accounts through the administrative REST API, even when new user registration functionality is disabled. This could lead to unauthorized account creation and potential system compromise (Red Hat Bugzilla).
The vulnerability has been fixed in Keycloak version 15.1.1 and version 16.0.0. Users should upgrade to these or later versions to address the security issue. Red Hat has also released security updates for affected products including Red Hat Single Sign-On (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."