Loading
A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.
Use CWE-20, Redhat vendor hub and Keycloak product page to widen CVE-2020-1714 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-3047, CVE-2024-1132 and CVE-2023-6841 for nearby disclosures in the same product family.