Vulnerability Description
A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Keycloak | >= 12.0.0, < 15.1.1 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2033602Issue TrackingThird Party Advisory
- https://github.com/keycloak/keycloak/issues/9247Third Party Advisory
- https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487Third Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.htmlNot Applicable
- https://bugzilla.redhat.com/show_bug.cgi?id=2033602Issue TrackingThird Party Advisory
- https://github.com/keycloak/keycloak/issues/9247Third Party Advisory
- https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487Third Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.htmlNot Applicable
FAQ
What is CVE-2021-4133?
CVE-2021-4133 is a vulnerability with a CVSS score of 8.8 (HIGH). A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even ...
How severe is CVE-2021-4133?
CVE-2021-4133 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-4133?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Keycloak.