Keycloak's OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.
{
"github_reviewed": true,
"github_reviewed_at": "2023-03-02T23:25:43Z",
"nvd_published_at": "2023-08-04T18:15:11Z",
"cwe_ids": [
"CWE-287",
"CWE-345"
],
"severity": "HIGH"
}