{"id":"CVE-2022-3782","details":"keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.","aliases":["GHSA-g8q8-fggx-9r3q"],"modified":"2026-04-10T04:49:56.626349Z","published":"2023-01-13T06:15:11.187Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2022-3782"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/keycloak/keycloak","events":[{"introduced":"0"},{"last_affected":"e6ece3318230d73a86ee0e6bdd7bb004fa6c264f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"20.0.2"}]}}],"versions":["1.0-alpha-1","1.0-alpha-1-12062013","1.0-alpha-2","1.0-alpha-3","1.0-beta-1","1.0-beta-2","1.0-beta-4","1.0-final","1.0-rc-1","1.0.0.Final","1.1.0.Beta2","1.3.0.Final","2.4.0.Test","20.0.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3782.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}