CVE-2024-11736
Org.keycloak:keycloak-quarkus-server: unrestricted admin use of system and environment variables
CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.
| CWE | CWE-526 |
| Published | Jan 14, 2025 |
| Last Updated | Nov 20, 2025 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new medium vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
Red Hat / Red Hat build of Keycloak 26.0
All versions affected Red Hat / Red Hat build of Keycloak 26.0
All versions affected Red Hat / Red Hat build of Keycloak 26.0
All versions affected Red Hat / RHBK 26.0.8
All versions affected Red Hat / Red Hat JBoss Enterprise Application Platform 8
All versions affected Red Hat / Red Hat JBoss Enterprise Application Platform Expansion Pack
All versions affected References
Credits
This issue was discovered by Steven Hawkins (Red Hat).