{"id":"CVE-2023-2585","details":"Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.","aliases":["GHSA-f5h4-wmp5-xhg6"],"modified":"2026-03-15T22:44:30.176241Z","published":"2023-12-21T10:15:34.533Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-2585"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3883"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3884"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3885"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3888"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3892"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196335"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2585.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"4.11"}]},{"events":[{"introduced":"0"},{"last_affected":"4.12"}]},{"events":[{"introduced":"0"},{"last_affected":"4.9"}]},{"events":[{"introduced":"0"},{"last_affected":"4.10"}]},{"events":[{"introduced":"0"},{"last_affected":"4.9"}]},{"events":[{"introduced":"0"},{"last_affected":"4.10"}]},{"events":[{"introduced":"0"},{"last_affected":"4.9"}]},{"events":[{"introduced":"0"},{"last_affected":"4.10"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}]}