### [CVE-2018-14655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14655) ![](https://img.shields.io/static/v1?label=Product&message=keycloak&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%203.4.3.Final%2C%204.0.0.Beta2%2C%204.3.0.Final%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79&color=brighgreen) ### Description A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/NeuronAddict/keycloak-scanner - https://github.com/jm33-m0/go-lpe