{"id":"CVE-2022-1274","details":"A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.","aliases":["GHSA-m4fv-gm5m-4725"],"modified":"2026-05-18T05:53:15.713370944Z","published":"2023-03-29T00:00:00Z","database_specific":{"cwe_ids":["CWE-80"],"cna_assigner":"redhat","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/1xxx/CVE-2022-1274.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/1xxx/CVE-2022-1274.json"},{"type":"ADVISORY","url":"https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725"},{"type":"ADVISORY","url":"https://herolab.usd.de/security-advisories/usd-2021-0033/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1274"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073157"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/keycloak/keycloak","events":[{"introduced":"0"},{"fixed":"57eda39e3cd2feef3749a071909ab5a88ab242c3"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"20.0.5"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*"}}],"versions":["2.4.0.Test","1.3.0.Final","1.1.0.Beta2","1.0.0.Final","1.0-final","1.0-rc-1","1.0-beta-4","1.0-beta-2","1.0-beta-1","1.0-alpha-3","1.0-alpha-2","1.0-alpha-1","1.0-alpha-1-12062013"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1274.json"}}],"schema_version":"1.7.5"}