Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-v897-pv23-r8cw: Keycloak has an improper input validation vulnerability

A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker can craft requests to mask path segments, potentially bypassing proxy-level path filtering. This could expose administrative or sensitive endpoints that operators believe are not externally reachable.

ghsa
#vulnerability#git#java#intel#maven

Skip to content

Navigation Menu

    • AI CODE CREATION

      • GitHub CopilotWrite better code with AI

      • GitHub SparkBuild and deploy intelligent apps

      • GitHub ModelsManage and compare prompts

      • MCP RegistryNewIntegrate external tools

View all features
  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

Appearance settings

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2026-0976

Keycloak has an improper input validation vulnerability

Low severity GitHub Reviewed Published Jan 15, 2026 to the GitHub Advisory Database • Updated Jan 15, 2026

Package

maven org.keycloak:keycloak-quarkus-server (Maven)

Affected versions

<= 26.2.5

Description

Published to the GitHub Advisory Database

Jan 15, 2026

Last updated

Jan 15, 2026

EPSS score

ghsa: Latest News

GHSA-cwjm-3f7h-9hwq: Traefik's ACME TLS-ALPN fast path lacks timeouts and close on handshake stall