Security Policy

This policy is based on the CISA vulnerability disclosure policy template

Introduction

The Keycloak team believes that everyone, everywhere, is entitled to the access and quality information needed to mitigate security and privacy risks. We strive to protect communities of users, contributors, and partners from digital security threats. We believe an open approach to vulnerability management is the best way to achieve this.

This policy supports our open approach and is intended to give security researchers clear guidelines for submitting and coordinating discovered vulnerabilities with us. In complying with this policy, you authorize CNCF to work with you to understand and resolve the issue quickly. For more details about our processes, please read the security charter.

Guidelines

Violation of these guidelines may result in the individual, or vendor, being added to a denied coordination list.

Scope

This policy applies to all Keycloak components and projects. Research disclosed to the project will be limited to Response Team members; however, we will assist in coordinating the disclosure of research with upstream open-source communities as needed and requested.

Reporting a Suspected Vulnerability

Suspected vulnerabilities should be disclosed responsibly and not made public until after analysis and a fix are available. We will acknowledge your report within 7 business days and work with you to confirm the vulnerability's existence and impact. Our goal is to maintain open dialogue during the assessment and remediation process.

Supported Versions

Depending on the severity of a vulnerability the issue may be fixed in the current major.minor release of Keycloak, or for lower severity vulnerabilities or hardening in the following major.minor release. Refer to https://www.keycloak.org/downloads to find the latest release.

If you are unable to regularly upgrade Keycloak, we encourage you to consider Red Hat build of Keycloak, which offers long term support of specific versions of Keycloak.

Experimental Features

While we welcome bug reports against features that are not released yet, the security team usually does not issue CVEs for experimental features. The preview state marks that the feature is mature enough to start normal security handling.

Instead, those issues will be managed as regular bugs publicly. If in doubt, report your finding via email to the security team first to clarify if it is related to an experimental feature.

Coordinated Vulnerability Disclosure

If you are reporting known CVEs related to third-party libraries used in Keycloak, create a new GitHub issue.

If you discover any publicly disclosed security vulnerabilities, notify us through keycloak-security@googlegroups.com.

If you are a security researcher and want to report a security vulnerability in the Keycloak codebase, follow these steps:

  1. Test against the latest released version of Keycloak and include the affected version in your report.
  2. Provide detailed instructions on how to reproduce the issue with a minimal and reproducible example.
  3. Show clear evidence of exploitation like log output or screenshots. We will reject reports based on static scanners without a proof-of-concept.
  4. Include your contact information for acknowledgements. See "Attribution Policy" below for details.
  5. Submit each finding individually to allow a separate discussion thread with our triage team.
  6. Pick a descriptive subject for the mail matching the reported finding.
  7. Email your report to keycloak-security@googlegroups.com.

If you are a user of Keycloak and want to report a security concern, follow these steps:

  1. Identify the Keycloak version affected. Ideally, verify with the latest released version of Keycloak.
  2. If available, provide detailed instructions on how to reproduce the issue with a minimal and reproducible example.
  3. If available, provide log files or screenshots.
  4. Include your contact information for acknowledgements. See "Attribution Policy" below for details.
  5. Submit each finding individually to allow a separate discussion thread with our triage team.
  6. Pick a descriptive subject for the mail matching the reported finding.
  7. Email your report to keycloak-security@googlegroups.com.

Attribution Policy

We will credit reporters who informed us in private about security vulnerabilities in security advisories.

The attribution can contain the name, alias, company and group affiliation of the reporter. For GitHub issues, it can also include the GitHub username. We will not include email addresses or links.

Bug Bounty

There is currently no active bug bounty.

Security Scanners

Reports from automated security scanners will not be accepted. These tools often report false positives, and can be disruptive to the project maintainers as it takes a long time to analyze these reports. If you believe you have found a security vulnerability using a security scanner, it is your responsibility to provide a clear example of the vulnerability and how it could be exploited specifically for Keycloak as outlined above.