Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8883: URL Redirection to Untrusted Site ('Open Redirect')

0
Medium
VulnerabilityCVE-2024-8883cvecve-2024-8883
Published: Thu Sep 19 2024 (09/19/2024, 15:48:28 UTC)
Source: CVE

Description

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

AI-Powered Analysis

AILast updated: 01/23/2026, 19:14:17 UTC

Technical Analysis

CVE-2024-8883 is an open redirect vulnerability identified in Keycloak, an open-source identity and access management solution widely used for single sign-on and authentication. The vulnerability arises from a misconfiguration where the 'Valid Redirect URI' parameter is set to local addresses such as http://localhost or http://127.0.0.1. This configuration flaw allows an attacker to craft URLs that redirect users to arbitrary external sites after authentication. Because Keycloak uses redirect URIs to return authorization codes during OAuth2/OpenID Connect flows, an attacker exploiting this vulnerability can intercept these codes by redirecting users to malicious endpoints. This can lead to exposure of sensitive tokens and subsequent session hijacking or unauthorized access. The vulnerability affects multiple versions of Keycloak, including 0, 23.0.0, and 25.0.0. The CVSS 3.1 score of 6.1 indicates a medium severity, reflecting that the attack vector is network-based, requires no privileges but does require user interaction, and impacts confidentiality and integrity with a scope change. No public exploits are currently known, but the flaw poses a significant risk if exploited in phishing or social engineering attacks. The vulnerability underscores the importance of strict validation and configuration of redirect URIs in identity platforms to prevent open redirect attacks.

Potential Impact

For European organizations, the impact of CVE-2024-8883 can be significant, particularly for those relying on Keycloak for authentication and authorization services. Exploitation can lead to unauthorized disclosure of authorization codes, enabling attackers to hijack user sessions and gain unauthorized access to sensitive systems and data. This can compromise user accounts, internal applications, and cloud services integrated with Keycloak. The exposure of sensitive tokens can also facilitate lateral movement within networks and escalate privileges. Given the widespread adoption of Keycloak in government, finance, healthcare, and enterprise sectors across Europe, the vulnerability could disrupt critical services and erode trust in digital identity systems. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal data is exposed due to session hijacking. The requirement for user interaction means phishing campaigns could be a likely exploitation vector, increasing the risk to end users and organizations.

Mitigation Recommendations

To mitigate CVE-2024-8883, organizations should immediately audit their Keycloak configurations to identify any 'Valid Redirect URI' entries set to http://localhost, http://127.0.0.1, or other insecure local addresses. These entries should be removed or replaced with secure, fully qualified domain names that are strictly controlled. Implement strict validation logic for redirect URIs to ensure only trusted and pre-approved URLs are accepted. Employ allowlists rather than broad patterns to minimize the attack surface. Additionally, enable and enforce the use of Proof Key for Code Exchange (PKCE) in OAuth2 flows to reduce the risk of authorization code interception. Monitor authentication logs for unusual redirect patterns or spikes in failed login attempts that may indicate exploitation attempts. Educate users about phishing risks and suspicious links, as user interaction is required for exploitation. Finally, keep Keycloak instances updated with the latest security patches once available and consider deploying web application firewalls (WAFs) with rules to detect and block open redirect attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-16T06:45:30.550Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbebe5b

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 1/23/2026, 7:14:17 PM

Last updated: 2/4/2026, 3:13:53 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats