
Cloud Vulnerability DB
A community-led vulnerabilities database
A privilege escalation vulnerability (CVE-2022-1245) was discovered in the token exchange feature of Keycloak. The vulnerability was disclosed on April 25, 2022, affecting Keycloak versions prior to 18.0.0. The flaw allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target, potentially leading to unauthorized access (Keycloak Advisory).
The vulnerability stems from missing authorization controls in Keycloak's token exchange feature. The flaw is classified under CWE-284 (Improper Access Control) and has been assessed with a Moderate severity rating. The issue specifically affects the token exchange mechanism where authorization checks were insufficient to prevent unauthorized token exchanges between clients (Keycloak Advisory, Red Hat Advisory).
The vulnerability could allow a malicious client application to perform privilege escalation by exchanging tokens for any target client, potentially gaining unauthorized access to additional services. This could lead to unauthorized access to protected resources and services within the Keycloak ecosystem (Keycloak Advisory).
The vulnerability has been patched in Keycloak version 18.0.0. Users are advised to upgrade to this version or later to address the security issue. Red Hat has also released security updates for affected products, including Red Hat Single Sign-On 7.5.2 for RHEL 8 (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."