It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
https://bugzilla.redhat.com/show_bug.cgi?id=1489161
https://access.redhat.com/errata/RHSA-2017:2906
https://access.redhat.com/errata/RHSA-2017:2905