{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:45:33.449","vulnerabilities":[{"cve":{"id":"CVE-2023-6544","sourceIdentifier":"secalert@redhat.com","published":"2024-04-25T16:15:10.097","lastModified":"2024-11-21T08:44:03.880","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardize an environment with this specific Dynamic Client Registration and TrustedDomain configuration previously unauthorized."},{"lang":"es","value":"Se encontró una falla en el paquete Keycloak. Este problema se produce debido a una expresión regular permisiva codificada para el filtrado que permite a los hosts registrar un cliente dinámico. Un usuario malintencionado con suficiente información sobre el entorno podría poner en peligro un entorno con este registro dinámico de cliente específico y esta configuración de TrustedDomain previamente no autorizada."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-625"}]}],"references":[{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1860","source":"secalert@redhat.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1861","source":"secalert@redhat.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1862","source":"secalert@redhat.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1864","source":"secalert@redhat.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1866","source":"secalert@redhat.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1867","source":"secalert@redhat.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1868","source":"secalert@redhat.com"},{"url":"https:\/\/access.redhat.com\/security\/cve\/CVE-2023-6544","source":"secalert@redhat.com"},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2253116","source":"secalert@redhat.com"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1860","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1861","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1862","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1864","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1866","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1867","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2024:1868","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/access.redhat.com\/security\/cve\/CVE-2023-6544","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2253116","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}