CVE-2021-3513: Incorrect implementation of lockout feature in Keycloak
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42463%
CWE
Published
8/23/2022
Updated
1/28/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.keycloak:keycloak-parent | maven | < 13.0.0 | 13.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) Error messages revealed whether an account was locked vs having invalid credentials (CWE-209), and 2) Authentication flow allowed password validation before checking lock status (CWE-522). The GitHub PR #7976 shows these were fixed by a) making error messages generic for locked accounts regardless of password validity, and b) adding early account status checks. The identified functions are core authentication handlers where these flawed checks would logically occur based on Keycloak's architecture and the patch's focus on user status validation and error message unification.