VYPR
Moderate severityNVD Advisory· Published Jan 11, 2023· Updated Apr 9, 2025

CVE-2023-0091

CVE-2023-0091

Description

A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Keycloak fails to validate token revocation in client credential flow, letting attackers with a leaked token access or modify sensitive data.

Vulnerability

CVE-2023-0091 is a flaw in Keycloak where the client registration endpoints do not properly check whether an access token has been revoked during the client credential flow [1][2]. This means that even if a service account token is explicitly revoked, Keycloak continues to accept it for operations that require create-client or manage-clients roles [4]. The root cause is missing revocation validation on these specific endpoints.

Exploitation

An attacker who obtains a leaked or stolen access token for a service account with sufficient privileges can use it against the client registration endpoints. No additional authentication is needed beyond possessing the revoked token. The attacker can then create new clients or modify existing client configurations [4]. The attack is performed over the network and requires no special position beyond being able to send HTTP requests to the Keycloak server.

Impact

Successful exploitation lets the attacker access or modify potentially sensitive information managed by Keycloak [2]. By creating or altering clients, the attacker could intercept authentication flows, gain unauthorized access to other applications, or exfiltrate data. The flaw directly undermines the token revocation mechanism, which is a critical security control for identity and access management platforms.

Mitigation

Red Hat has issued a fix in Keycloak version 20.0.3 and later [4]. Organizations running affected versions (earlier than 20.0.3) should upgrade immediately. No workaround is documented; patching is the only recommended remediation.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-coreMaven
< 20.0.320.0.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.