It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
https://access.redhat.com/errata/RHSA-2017:2906
https://access.redhat.com/errata/RHSA-2017:2905
https://access.redhat.com/errata/RHSA-2017:2904
http://www.securityfocus.com/bid/101618
https://bugzilla.redhat.com/show_bug.cgi?id=1489161
Source: Mitre, NVD
Published: 2017-10-26
Updated: 2025-04-20
Base Score: 3.5
Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N
Severity: Low
Base Score: 5.4
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Severity: Medium
EPSS: 0.00668