Description

A flaw was found in Keycloak. Keycloak’s account console and other pages accept arbitrary text in the error_description query parameter. This text is directly rendered in error pages without validation or sanitization. While HTML encoding prevents XSS, an attacker can craft URLs with misleading messages (e.g., fake support phone numbers or URLs), which are displayed within the trusted Keycloak UI. This creates a phishing vector, potentially tricking users into contacting malicious actors.

INFO

Published Date :

2025-09-05T19:59:04.454Z

Last Modified :

2025-09-05T20:15:19.741Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-10044 vulnerability.

Vendors Products
Redhat
  • Build Keycloak
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-10044.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact