Openstack Keystone vulnerabilities

38 known vulnerabilities affecting openstack/keystone.

Total CVEs
38
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH10MEDIUM25LOW3

Vulnerabilities

Page 1 of 2
CVE-2026-40683HIGHCVSS 7.7≥ 8.0.0, < 25.0.1≥ 26.0.0, < 26.1.1+2 more2026-04-14
CVE-2026-40683 [HIGH] CWE-843 CVE-2026-40683: In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert the user enabled att In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert the user enabled attribute to a boolean when the user_enabled_invert configuration option is False (the default). The _ldap_res_to_model method in the UserApi class only performed string-to-boolean conversion when user_enabled_invert was True. When False, the raw string va
cvelistv5nvd
CVE-2026-33551LOWCVSS 3.5≥ 14.0.0, < 26.1.1v27.0.0+2 more2026-04-10
CVE-2026-33551 [LOW] CWE-863 CVE-2026-33551: An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0. An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with only a reader role may obtain an EC2/S3 credential that carries the full se
cvelistv5nvd
CVE-2025-65073HIGHCVSS 7.5fixed in 26.0.1v27.0.0+1 more2025-11-17
CVE-2025-65073 [HIGH] CWE-863 CVE-2025-65073: OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to provide Keystone authorization.
cvelistv5nvd
CVE-2021-38155HIGHCVSS 7.5≥ 10.0.0, < 16.0.2≥ 17.0.0, < 17.0.1+2 more2021-08-06
CVE-2021-38155 [HIGH] CWE-307 CVE-2021-38155: OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain
nvd
CVE-2020-12689HIGHCVSS 8.8fixed in 15.0.1v16.0.02020-05-07
CVE-2020-12689 [HIGH] CWE-269 CVE-2020-12689: An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated with An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a proj
nvd
CVE-2020-12691HIGHCVSS 8.8fixed in 15.0.1v16.0.02020-05-07
CVE-2020-12691 [HIGH] CWE-863 CVE-2020-12691: An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the a
nvd
CVE-2020-12690HIGHCVSS 8.8fixed in 15.0.1v16.0.02020-05-07
CVE-2020-12690 [HIGH] CWE-613 CVE-2020-12690: An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more rol
nvd
CVE-2020-12692MEDIUMCVSS 5.4fixed in 15.0.1v16.0.02020-05-07
CVE-2020-12692 [MEDIUM] CWE-294 CVE-2020-12692: An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
nvd
CVE-2019-19687HIGHCVSS 8.8v15.0.0v16.0.02019-12-09
CVE-2019-19687 [HIGH] CWE-522 CVE-2019-19687: OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any us OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Ti
nvd
CVE-2013-2255MEDIUMCVSS 5.9v20132019-11-01
CVE-2013-2255 [MEDIUM] CWE-295 CVE-2013-2255: HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.
cvelistv5nvd
CVE-2018-20170MEDIUMCVSS 5.3≤ 14.0.12018-12-17
CVE-2018-20170 [MEDIUM] CWE-200 CVE-2018-20170: OpenStack Keystone through 14.0.1 has a user enumeration vulnerability because invalid usernames hav OpenStack Keystone through 14.0.1 has a user enumeration vulnerability because invalid usernames have much faster responses than valid ones for a POST /v3/auth/tokens request. NOTE: the vendor's position is that this is a hardening opportunity, and not necessarily an issue that should have an OpenStack Security Advisory
nvd
CVE-2018-14432MEDIUMCVSS 5.3fixed in 11.0.4v12.0.0+1 more2018-07-31
CVE-2018-14432 [MEDIUM] CWE-200 CVE-2018-14432: In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticate In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Key
nvd
CVE-2015-7546HIGHCVSS 7.5≥ 8.0.0, < 8.0.2≥ 2015.1.0, ≤ 2015.1.22016-02-03
CVE-2015-7546 [HIGH] CWE-522 CVE-2015-7546: The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass i
nvd
CVE-2015-3646MEDIUMCVSS 4.0≥ 2014.1, < 2014.1.5≥ 2014.2.0, < 2014.2.42015-05-12
CVE-2015-3646 [MEDIUM] CWE-200 CVE-2015-3646: OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.
nvd
CVE-2014-0204MEDIUMCVSS 6.5≥ 2014.1, < 2014.1.12014-11-03
CVE-2014-0204 [MEDIUM] CWE-269 CVE-2014-0204: OpenStack Identity (Keystone) before 2014.1.1 does not properly handle when a role is assigned to a OpenStack Identity (Keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same ID as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same ID.
nvd
CVE-2014-3520MEDIUMCVSS 6.5≥ 2013.2, < 2013.2.4≥ 2014.1, < 2014.1.22014-10-26
CVE-2014-3520 [MEDIUM] CWE-863 CVE-2014-3520: OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request.
nvd
CVE-2014-3621MEDIUMCVSS 4.0≥ 2013.2, < 2013.2.3≥ 2014.1, < 2014.1.2.12014-10-02
CVE-2014-3621 [MEDIUM] CWE-200 CVE-2014-3621: The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014. The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field.
nvd
CVE-2014-5252MEDIUMCVSS 4.9v2014.1v2014.1.2+2 more2014-08-25
CVE-2014-5252 [MEDIUM] CWE-255 CVE-2014-5252: The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 update The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/.
nvd
CVE-2014-5253MEDIUMCVSS 4.9v2014.1v2014.1.2+2 more2014-08-25
CVE-2014-5253 [MEDIUM] CWE-255 CVE-2014-5253: OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly re OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain.
nvd
CVE-2014-5251MEDIUMCVSS 4.9v2014.1v2014.1.2+2 more2014-08-25
CVE-2014-5251 [MEDIUM] CWE-255 CVE-2014-5251: The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before J The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token.
nvd