Cross-site Scripting (XSS) Affecting keycloak-doc package, versions <26.4.7-r2


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-KEYCLOAKDOC-14168859
  • published3 Dec 2025
  • disclosed26 Nov 2025

Introduced: 26 Nov 2025

CVE-2025-66021  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Minimos:latest keycloak-doc to version 26.4.7-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream keycloak-doc package and not the keycloak-doc package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

OWASP Java HTML Sanitizer is a configureable HTML Sanitizer written in Java, allowing inclusion of HTML authored by third-parties in web applications while protecting against XSS. In version 20240325.1, OWASP java html sanitizer is vulnerable to XSS if HtmlPolicyBuilder allows noscript and style tags with allowTextIn inside the style tag. This could lead to XSS if the payload is crafted in such a way that it does not sanitise the CSS and allows tags which is not mentioned in HTML policy. At time of publication no known patch is available.

CVSS Base Scores

version 3.1