VYPR
Moderate severityNVD Advisory· Published Apr 26, 2022· Updated Aug 3, 2024

CVE-2022-1466

CVE-2022-1466

Description

Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Red Hat Single Sign-On 7.5.0.GA allows unauthorized users to add accounts to the master realm due to improper authorization.

Vulnerability

Red Hat Single Sign-On (RH-SSO) 7.5.0.GA contains an improper authorization vulnerability (CWE-863) that allows users to perform actions they should not be allowed to perform. Specifically, it was possible to add users to the master realm even though no respective permission was granted [1][2]. The issue resides in the authorization logic for realm management, where the server fails to properly enforce permissions for the master realm when handling user creation requests.

Exploitation

An attacker needs a valid user account with administrative privileges in all realms except the master realm, where read-only permissions are granted. Although the "add user" button is not displayed in the master realm UI, the attacker can send a direct server request (e.g., via HTTP API) to create new user accounts in the master realm [2][3]. The SySS advisory provides a proof of concept demonstrating this bypass [2].

Impact

Successful exploitation allows the attacker to create arbitrary user accounts in the master realm, which is the top-level administrative realm. This can lead to privilege escalation, unauthorized access to the entire RH-SSO deployment, and potential compromise of all realms managed by the instance [2].

Mitigation

Red Hat released a fix for this vulnerability on 2022-02-07 [2]. Users should upgrade to a patched version of RH-SSO (e.g., 7.5.1 or later). The Red Hat Bugzilla entry (CVE-2022-1466) was closed as NOTABUG, but the SySS advisory confirms the fix was provided to the vendor and released [4]. No workaround is documented; upgrading is the recommended mitigation.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-coreMaven
< 17.0.117.0.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.