Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
keycloak Vendor: redhat

About This Product

keycloak is a software product offered by redhat. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 98 known vulnerabilities affecting redhat keycloak. This includes 6 critical-severity issues and 27 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2017 to 2026, indicating a sustained research interest and ongoing security attention. 57 medium-severity issues and 8 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-12160 2017-10-26 2025-04-20 7.2 6.5 Likely
CVE-2016-8629 2018-03-12 2024-11-21 6.5 5.5 Likely
CVE-2017-2585 2018-03-12 2024-11-21 5.9 4.3 Likely
CVE-2016-8627 2018-05-11 2024-11-21 4.3 4.3 Likely
CVE-2018-10912 2018-07-23 2024-11-21 4.9 4.0 Likely
CVE-2017-2582 2018-07-26 2024-11-21 6.5 4.0 Likely
CVE-2017-2646 2018-07-27 2024-11-21 7.5 5.0 Likely
CVE-2016-8609 2018-08-01 2024-11-21 3.7 5.8 Likely
CVE-2018-10894 2018-08-01 2024-11-21 5.4 5.5 Likely
CVE-2018-14655 2018-11-13 2024-11-21 4.6 3.5 Unknown
CVE-2018-14657 2018-11-13 2024-11-21 8.1 4.3 Likely
CVE-2018-14658 2018-11-13 2024-11-21 6.1 5.8 Likely
CVE-2018-14637 2018-11-30 2024-11-21 6.1 6.8 Likely
CVE-2019-3868 2019-04-24 2024-11-21 3.8 5.5 Likely
CVE-2019-10157 2019-06-12 2024-11-21 4.7 2.1 Unknown
CVE-2019-3875 2019-06-12 2024-11-21 6.5 5.8 Likely
CVE-2019-10199 2019-08-14 2024-11-21 8.8 6.8 Likely
CVE-2019-10201 2019-08-14 2024-11-21 8.1 5.5 Likely
CVE-2019-14832 2019-10-15 2024-11-21 7.5 6.0 Unknown
CVE-2014-3655 2019-11-13 2024-11-21 4.3 4.3 Likely
CVE-2019-14909 2019-12-04 2024-11-21 8.3 7.5 Likely
CVE-2019-14910 2019-12-05 2024-11-21 9.8 7.5 Likely
CVE-2014-3652 2019-12-15 2024-11-21 6.1 5.8 Likely
CVE-2019-14837 2020-01-07 2024-11-21 9.1 6.4 Likely
CVE-2019-14820 2020-01-08 2024-11-21 4.3 4.0 Likely
CVE-2020-1697 2020-02-10 2024-11-21 6.1 3.5 Unknown
CVE-2020-1744 2020-03-24 2024-11-21 5.6 6.8 Likely
CVE-2020-1728 2020-04-06 2024-11-21 4.8 5.8 Likely
CVE-2020-10686 2020-05-04 2024-11-21 4.1 6.5 Likely
CVE-2019-10169 2020-05-08 2024-11-21 6.6 6.5 Likely
CVE-2019-10170 2020-05-08 2024-11-21 6.6 6.5 Likely
CVE-2020-1698 2020-05-11 2024-11-21 5.0 2.1 Unknown
CVE-2020-1724 2020-05-11 2024-11-21 4.3 4.0 Likely
CVE-2020-1718 2020-05-12 2024-11-21 7.1 6.5 Likely
CVE-2020-1714 2020-05-13 2024-11-21 8.8 6.5 Likely
CVE-2020-1758 2020-05-15 2024-11-21 5.3 4.3 Likely
CVE-2020-1727 2020-06-22 2024-11-21 6.4 5.5 Likely
CVE-2020-10758 2020-09-16 2024-11-21 7.5 5.0 Likely
CVE-2020-10748 2020-09-16 2024-11-21 6.1 4.3 Likely
CVE-2020-1694 2020-09-16 2024-11-21 4.9 4.0 Likely
CVE-2020-14366 2020-11-09 2024-11-21 6.8 5.0 Likely
CVE-2020-10776 2020-11-17 2024-11-21 4.8 3.5 Unknown
CVE-2020-14389 2020-11-17 2024-11-21 8.1 5.5 Likely
CVE-2020-10770 2020-12-15 2024-11-21 5.3 5.0 Likely
CVE-2020-14302 2020-12-15 2024-11-21 4.9 4.0 Likely
CVE-2020-1725 2021-01-28 2024-11-21 5.4 5.5 Likely
CVE-2020-10734 2021-02-11 2024-11-21 3.3 2.1 Unknown
CVE-2020-1717 2021-02-11 2024-11-21 2.7 4.0 Likely
CVE-2020-27838 2021-03-08 2024-11-21 6.5 4.3 Likely
CVE-2021-20262 2021-03-09 2024-11-21 6.8 4.6 Unknown
CVE-2021-20222 2021-03-23 2024-11-21 7.5 5.1 Unknown
CVE-2021-20202 2021-05-12 2024-11-21 7.3 4.6 Unknown
CVE-2020-27826 2021-05-28 2024-11-21 4.2 4.9 Unknown
CVE-2021-20195 2021-05-28 2024-11-21 9.6 6.8 Likely
CVE-2021-3637 2021-07-09 2024-11-21 7.5 5.0 Likely
CVE-2021-4133 2022-01-25 2024-11-21 8.8 6.5 Likely
CVE-2021-20323 2022-03-25 2024-11-21 6.1 4.3 Likely
CVE-2021-3461 2022-04-01 2024-11-21 7.1 3.3 Unknown
CVE-2022-1466 2022-04-26 2024-11-21 6.5 4.0 Likely
CVE-2022-1245 2022-07-08 2024-11-21 9.8 7.5 Likely
CVE-2022-2668 2022-08-05 2024-11-21 7.2 - -
CVE-2021-3513 2022-08-22 2024-11-21 7.5 - -
CVE-2020-35509 2022-08-23 2025-06-30 5.4 - -
CVE-2021-3827 2022-08-23 2024-11-21 6.8 - -
CVE-2021-3632 2022-08-26 2024-11-21 7.5 - -
CVE-2021-3754 2022-08-26 2024-11-21 5.3 - -
CVE-2021-3856 2022-08-26 2024-11-21 4.3 - -
CVE-2022-0225 2022-08-26 2024-11-21 5.4 - -
CVE-2022-3782 2023-01-13 2025-04-09 9.1 - -
CVE-2023-0091 2023-01-13 2025-04-09 3.8 - -
CVE-2023-0105 2023-01-13 2025-04-09 6.5 - -
CVE-2022-1274 2023-03-29 2024-11-21 5.4 - -
CVE-2023-1664 2023-05-26 2025-01-15 6.5 - -
CVE-2022-4361 2023-07-07 2024-11-21 10.0 - -
CVE-2023-0264 2023-08-04 2024-11-21 5.0 - -
CVE-2023-4918 2023-09-12 2024-11-21 8.8 - -
CVE-2022-1438 2023-09-20 2024-11-21 6.4 - -
CVE-2022-3916 2023-09-20 2024-11-21 6.8 - -
CVE-2022-4137 2023-09-25 2024-11-21 8.1 - -
CVE-2023-2422 2023-10-04 2024-11-21 5.5 - -
CVE-2023-6563 2023-12-14 2024-11-21 7.7 - -
CVE-2023-6134 2023-12-14 2024-11-21 4.6 - -
CVE-2023-48795 2023-12-18 2025-11-04 5.9 - -
CVE-2023-6927 2023-12-18 2024-11-21 4.6 - -
CVE-2023-6291 2024-01-26 2024-11-21 7.1 - -
CVE-2024-0560 2024-02-28 2025-01-21 6.3 - -
CVE-2024-1722 2024-02-29 2025-02-14 3.7 - -
CVE-2024-1132 2024-04-17 2025-06-30 8.1 - -
CVE-2023-6787 2024-04-25 2025-06-30 6.5 - -
CVE-2024-4629 2024-09-03 2024-11-21 6.5 - -
CVE-2024-7260 2024-09-09 2024-10-01 6.1 - -
CVE-2024-7341 2024-09-09 2024-10-04 7.1 - -
CVE-2023-6841 2024-09-10 2024-10-01 7.5 - -
CVE-2025-5416 2025-06-20 2025-08-13 2.7 - -
CVE-2025-7365 2025-07-10 2026-01-08 7.1 - -
CVE-2025-8419 2025-08-06 2026-01-08 5.3 - -
CVE-2026-0871 2026-02-27 2026-03-05 4.9 - -
CVE-2025-12150 2026-02-27 2026-03-05 3.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for redhat keycloak by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.