Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8883: URL Redirection to Untrusted Site ('Open Redirect')

0
Medium
VulnerabilityCVE-2024-8883cvecve-2024-8883
Published: Thu Sep 19 2024 (09/19/2024, 15:48:28 UTC)
Source: CVE

Description

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 16:28:51 UTC

Technical Analysis

CVE-2024-8883 is an open redirect vulnerability identified in Keycloak, an open-source identity and access management solution widely used for single sign-on and authorization. The vulnerability arises from a misconfiguration where the 'Valid Redirect URI' is set to loopback addresses such as http://localhost or http://127.0.0.1. This setup allows an attacker to craft URLs that redirect users to arbitrary external sites after authentication. Because Keycloak uses redirect URIs to return authorization codes during OAuth2/OpenID Connect flows, an attacker exploiting this flaw can intercept these codes by redirecting victims to malicious endpoints. This exposure can lead to session hijacking or unauthorized access if the attacker exchanges the stolen authorization code for tokens. The vulnerability requires user interaction (clicking a malicious link) but does not require prior authentication, increasing its attack surface. The CVSS 3.1 score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction needed, and partial confidentiality and integrity impact. The scope is changed due to the potential compromise of tokens across systems relying on Keycloak for authentication. The affected versions include Keycloak 0, 23.0.0, and 25.0.0, indicating the issue spans multiple releases. No public exploits are known yet, but the risk remains significant due to the sensitive nature of authorization codes and session tokens. The vulnerability is documented and published as of September 19, 2024, with enrichment from CISA and Red Hat assigners. Organizations using Keycloak should audit their redirect URI configurations, especially avoiding localhost or loopback addresses in production environments, and monitor for updates or patches from Keycloak maintainers.

Potential Impact

The primary impact of CVE-2024-8883 is the potential exposure of sensitive authorization codes through open redirect attacks, which can lead to session hijacking and unauthorized access to protected resources. Organizations relying on Keycloak for authentication and authorization may face compromised user sessions, leading to data breaches, privilege escalation, and loss of trust. Since the vulnerability can be exploited remotely without authentication but requires user interaction, phishing campaigns or social engineering could be used to lure victims into clicking malicious links. The compromise of authorization codes can cascade into broader access to internal systems, cloud services, or third-party applications integrated with Keycloak. This can disrupt business operations, cause regulatory compliance violations, and damage organizational reputation. The medium severity rating reflects that while the vulnerability is not trivially exploitable without user action, the consequences of successful exploitation are significant, especially in environments with sensitive data or critical infrastructure. The scope of affected systems is broad given Keycloak's widespread adoption in enterprises, government agencies, and cloud providers worldwide.

Mitigation Recommendations

To mitigate CVE-2024-8883, organizations should immediately audit and remove any 'Valid Redirect URI' entries that use localhost (http://localhost) or loopback IP addresses (http://127.0.0.1) from Keycloak configurations in production environments. Redirect URIs should be strictly validated and limited to trusted domains under organizational control. Implement strict allowlists for redirect URIs and avoid wildcard or overly permissive patterns. Educate users about phishing risks and suspicious links to reduce the likelihood of successful social engineering attacks. Monitor authentication logs for unusual redirect patterns or repeated failed attempts. Apply any available patches or updates from Keycloak maintainers as soon as they are released. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block open redirect attempts. Additionally, implement multi-factor authentication (MFA) to reduce the impact of stolen authorization codes. Conduct regular security assessments and penetration testing focused on OAuth2/OpenID Connect flows to identify and remediate similar misconfigurations. Finally, maintain an incident response plan to quickly address any suspected compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-16T06:45:30.550Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbebe5b

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 2/27/2026, 4:28:51 PM

Last updated: 3/23/2026, 10:31:18 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses