-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from incomplete URI normalization in redirect validation. The commit b2e9110 explicitly fixes this by introducing stripOffRedirectForWildcard() to remove user-info, query, and fragment components before validation. The original matchesRedirects function (lines 256-257 in the patch) only handled query parameters, making it vulnerable to authority confusion via encoded user-info payloads like 'www%2ekeycloak%2eorg%2fapp%2f:y@example.com'. The function's failure to sanitize user-info before wildcard comparison directly enabled the validation bypass.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.keycloak:keycloak-services | maven | < 23.0.3 | 23.0.3 |
Ongoing coverage of React2Shell