{"id":"CVE-2023-4918","details":"A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the \"password\" and \"password-confirm\" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able to read users attributes, allowing a malicious user with minimal access to retrieve the users passwords in clear text, jeopardizing their environment.","aliases":["GHSA-5q66-v53q-pm35"],"modified":"2026-04-10T05:05:00.433403Z","published":"2023-09-12T20:15:10.390Z","related":["GHSA-5q66-v53q-pm35"],"references":[{"type":"ADVISORY","url":"https://github.com/keycloak/keycloak/security/advisories/GHSA-5q66-v53q-pm35"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-4918"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238588"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/keycloak/keycloak","events":[{"introduced":"0"},{"last_affected":"275f7a2368db7d99f37cea2b16ae444b764536f6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"22.0.2"}]}}],"versions":["1.0-alpha-1","1.0-alpha-1-12062013","1.0-alpha-2","1.0-alpha-3","1.0-beta-1","1.0-beta-2","1.0-beta-4","1.0-final","1.0-rc-1","1.0.0.Final","1.1.0.Beta2","1.3.0.Final","2.4.0.Test","22.0.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4918.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}