Duplicate Advisory: Keycloak Potential Variable Reference in Model Storage Services
Moderate severity
GitHub Reviewed
Published
Aug 21, 2025
to the GitHub Advisory Database
•
Updated Oct 8, 2025
Withdrawn
This advisory was withdrawn on Oct 8, 2025
Package
Affected versions
<= 26.3.3
Patched versions
None
Description
Published by the National Vulnerability Database
Aug 21, 2025
Published to the GitHub Advisory Database
Aug 21, 2025
Reviewed
Aug 22, 2025
Withdrawn
Oct 8, 2025
Last updated
Oct 8, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-8hxp-qmph-w5gq. This link is maintained to preserve external references.
Original Description
A flaw was found in org.keycloak/keycloak-model-storage-service. The KeycloakRealmImport custom resource substitutes placeholders within imported realm documents, potentially referencing environment variables. This substitution process
allows for injection attacks when crafted realm documents are processed. An attacker can leverage this to inject malicious content during the realm import procedure. This can lead to unintended consequences within the Keycloak environment.
References