A flaw was found in Keycloak in the OAuth 2.0 Pushed Authorization Requests (PAR). Client provided parameters were found to be included in plain text in the KCRESTART cookie returned by the authorization server's HTTP response to a requesturi authorization request. This could lead to an information disclosure vulnerability.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-200", "CWE-922" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-06-10T18:36:56Z" }