Keycloak vulnerable to Improper Certificate Validation
Moderate severity
GitHub Reviewed
Published
Aug 24, 2022
to the GitHub Advisory Database
•
Updated Jun 30, 2025
Description
Published by the National Vulnerability Database
Aug 23, 2022
Published to the GitHub Advisory Database
Aug 24, 2022
Reviewed
Dec 5, 2022
Last updated
Jun 30, 2025
keycloak accepts an expired certificate by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.
This issue was partially fixed in version 13.0.1 and more completely fixed in version 14.0.0.
References