Severity
Medium
Analysis Summary
Red Hat Keycloak could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the reset credential flow . By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass access restrictions to the application.
Impact
Security bypass
Affected Vendors
RedHat
Affected Products
RedHat Keycloak
Remediation
Refer to RedHat advisory for the list of affected products and patches.