VYPR
Low severity3.8GHSA Advisory· Published Feb 18, 2025· Updated Apr 15, 2026

CVE-2024-4028

CVE-2024-4028

Description

A vulnerability was found in Keycloak. This issue may allow a privileged attacker to use a malicious payload as the permission while creating items (Resource and Permissions) from the admin console, leading to a stored cross-site scripting (XSS) attack.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Keycloak admin console allows privileged attackers to inject stored XSS via malicious payload in permission fields when creating resources or permissions.

What the vulnerability is

CVE-2024-4028 is a stored cross-site scripting (XSS) vulnerability in Keycloak's admin console. The root cause is insufficient input sanitization of the permission field when creating resources or permissions. A privileged attacker can inject arbitrary JavaScript code that gets stored and executed when the admin interface renders the malicious permission [1][2].

How it is exploited

Exploitation requires the attacker to have privileged access to the Keycloak admin console. The attacker crafts a malicious payload as the permission value while creating a new resource or permission through the admin interface. This payload is stored in the backend and later executed in the browser of any administrator viewing the affected item [4].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the admin console. This could lead to session hijacking, administrative actions performed on behalf of the victim, or further compromise of the Keycloak instance [1][2].

Mitigation

As of the publication date, Red Hat has acknowledged the vulnerability and recommends updating to a patched version of Keycloak. Users should monitor official channels for the release of a fix and apply it promptly. No workarounds have been documented [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-coreMaven
<= 26.1.2

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.