CVE-2021-20323
Description
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Keycloak has a POST-based reflected XSS vulnerability allowing attackers to execute arbitrary JavaScript in victims' browsers.
Vulnerability
A POST-based reflected Cross-Site Scripting (XSS) vulnerability exists in Keycloak [1]. The flaw allows an attacker to inject malicious scripts via specially crafted HTTP POST requests. Affected versions include all Keycloak releases prior to the fix included in version 15.0.2 [1]. The vulnerability is reachable when the application processes unsanitized input from POST parameters.
Exploitation
An attacker can exploit this vulnerability without prior authentication by crafting a malicious POST request containing a JavaScript payload in a vulnerable parameter [1]. The attacker must then trick a victim into submitting the crafted request (e.g., via a link or form submission). No write access or race condition is required; the attack relies solely on user interaction to trigger the reflected payload.
Impact
Successful exploitation results in arbitrary JavaScript execution in the victim's browser within the security context of the Keycloak application [1]. This can lead to information disclosure, session hijacking, or other client-side attacks, potentially compromising the confidentiality and integrity of user data.
Mitigation
The vulnerability is fixed in Keycloak version 15.0.2 [1]. Users should upgrade to this version or later. No workaround is documented in the available references. Systems running older, unsupported versions of Keycloak remain vulnerable and should be upgraded immediately.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-coreMaven | >= 15.0.0, < 17.0.0 | 17.0.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-xpgc-j48j-jwv9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-20323ghsaADVISORY
- bugzilla.redhat.com/show_bug.cgighsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.