Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-3501 (GCVE-0-2025-3501)
Vulnerability from cvelistv5 – Published: 2025-04-29 20:45 – Updated: 2025-11-20 07:27- CWE-297 - Improper Validation of Certificate with Host Mismatch
| URL | Tags |
|---|---|
| https://access.redhat.com/errata/RHSA-2025:4335 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:4336 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:8672 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:8690 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/security/cve/CVE-2025-3501 | vdb-entryx_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=2358834 | issue-trackingx_refsource_REDHAT |
| https://github.com/keycloak/keycloak/issues/39350 | |
| https://github.com/keycloak/keycloak/pull/39366 |
| Vendor | Product | Version | |
|---|---|---|---|
|
Affected:
25.0.0 , < 25.*
(semver)
Affected: 26.0.0 , < 26.0.11 (semver) Unknown: 26.1.0 , < 26.1.* (semver) Affected: 26.2.0 , < 26.2.2 (semver) |
|||
| Red Hat | Red Hat Build of Keycloak |
cpe:/a:redhat:build_keycloak:26 |
|
| Red Hat | Red Hat build of Keycloak 26 |
cpe:/a:redhat:build_keycloak:26 |
|
| Red Hat | Red Hat build of Keycloak 26.0 |
Unaffected:
26.0.11-2 , < *
(rpm)
cpe:/a:redhat:build_keycloak:26.0::el9 |
|
| Red Hat | Red Hat build of Keycloak 26.0 |
Unaffected:
26.0-12 , < *
(rpm)
cpe:/a:redhat:build_keycloak:26.0::el9 |
|
| Red Hat | Red Hat build of Keycloak 26.0 |
Unaffected:
26.0-13 , < *
(rpm)
cpe:/a:redhat:build_keycloak:26.0::el9 |
|
| Red Hat | Red Hat build of Keycloak 26.2 |
Unaffected:
26.2.5-1 , < *
(rpm)
cpe:/a:redhat:build_keycloak:26.2::el9 |
|
| Red Hat | Red Hat build of Keycloak 26.2 |
Unaffected:
26.2-4 , < *
(rpm)
cpe:/a:redhat:build_keycloak:26.2::el9 |
|
| Red Hat | Red Hat build of Keycloak 26.2 |
Unaffected:
26.2-4 , < *
(rpm)
cpe:/a:redhat:build_keycloak:26.2::el9 |
|
| Red Hat | Red Hat Single Sign-On 7 |
cpe:/a:redhat:red_hat_single_sign_on:7 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3501",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-30T15:54:12.219389Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-30T15:54:23.128Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://www.keycloak.org/",
"defaultStatus": "unaffected",
"packageName": "keycloak",
"versions": [
{
"lessThan": "25.*",
"status": "affected",
"version": "25.0.0",
"versionType": "semver"
},
{
"lessThan": "26.0.11",
"status": "affected",
"version": "26.0.0",
"versionType": "semver"
},
{
"lessThan": "26.1.*",
"status": "unknown",
"version": "26.1.0",
"versionType": "semver"
},
{
"lessThan": "26.2.2",
"status": "affected",
"version": "26.2.0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:build_keycloak:26"
],
"defaultStatus": "unaffected",
"packageName": "keycloak",
"product": "Red Hat Build of Keycloak",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:build_keycloak:26"
],
"defaultStatus": "unaffected",
"product": "Red Hat build of Keycloak 26",
"vendor": "Red Hat"
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:build_keycloak:26.0::el9"
],
"defaultStatus": "affected",
"packageName": "rhbk/keycloak-operator-bundle",
"product": "Red Hat build of Keycloak 26.0",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "26.0.11-2",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:build_keycloak:26.0::el9"
],
"defaultStatus": "affected",
"packageName": "rhbk/keycloak-rhel9",
"product": "Red Hat build of Keycloak 26.0",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "26.0-12",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:build_keycloak:26.0::el9"
],
"defaultStatus": "affected",
"packageName": "rhbk/keycloak-rhel9-operator",
"product": "Red Hat build of Keycloak 26.0",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "26.0-13",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:build_keycloak:26.2::el9"
],
"defaultStatus": "affected",
"packageName": "rhbk/keycloak-operator-bundle",
"product": "Red Hat build of Keycloak 26.2",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "26.2.5-1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:build_keycloak:26.2::el9"
],
"defaultStatus": "affected",
"packageName": "rhbk/keycloak-rhel9",
"product": "Red Hat build of Keycloak 26.2",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "26.2-4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:build_keycloak:26.2::el9"
],
"defaultStatus": "affected",
"packageName": "rhbk/keycloak-rhel9-operator",
"product": "Red Hat build of Keycloak 26.2",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "26.2-4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:red_hat_single_sign_on:7"
],
"defaultStatus": "unaffected",
"packageName": "rh-sso7-keycloak",
"product": "Red Hat Single Sign-On 7",
"vendor": "Red Hat"
}
],
"datePublic": "2025-04-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Important"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-297",
"description": "Improper Validation of Certificate with Host Mismatch",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-20T07:27:01.176Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2025:4335",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"name": "RHSA-2025:4336",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"name": "RHSA-2025:8672",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8672"
},
{
"name": "RHSA-2025:8690",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:8690"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-3501"
},
{
"name": "RHBZ#2358834",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"url": "https://github.com/keycloak/keycloak/issues/39350"
},
{
"url": "https://github.com/keycloak/keycloak/pull/39366"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-04-10T12:24:28.784Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-04-29T00:00:00.000Z",
"value": "Made public."
}
],
"title": "Org.keycloak.protocol.services: keycloak hostname verification",
"workarounds": [
{
"lang": "en",
"value": "Use the correct TLS configuration and avoid using \"--tls-hostname-verifier=any\"."
}
],
"x_redhatCweChain": "CWE-297: Improper Validation of Certificate with Host Mismatch"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-3501",
"datePublished": "2025-04-29T20:45:29.507Z",
"dateReserved": "2025-04-10T12:29:29.427Z",
"dateUpdated": "2025-11-20T07:27:01.176Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-3501",
"date": "2026-05-15",
"epss": "0.00092",
"percentile": "0.25796"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-3501\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-04-29T21:15:51.523\",\"lastModified\":\"2025-08-07T13:15:36.340\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una falla en Keycloak. Al configurar la pol\u00edtica de verificaci\u00f3n como \\\"ALL\\\", se omite la verificaci\u00f3n del certificado del almac\u00e9n de confianza, lo cual es involuntario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-297\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2025:4335\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:4336\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8672\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:8690\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-3501\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2358834\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/keycloak/keycloak/issues/39350\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/keycloak/keycloak/pull/39366\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-3501\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-30T15:54:12.219389Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-30T15:54:18.202Z\"}}], \"cna\": {\"title\": \"Org.keycloak.protocol.services: keycloak hostname verification\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"25.0.0\", \"lessThan\": \"25.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"26.0.0\", \"lessThan\": \"26.0.11\", \"versionType\": \"semver\"}, {\"status\": \"unknown\", \"version\": \"26.1.0\", \"lessThan\": \"26.1.*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"26.2.0\", \"lessThan\": \"26.2.2\", \"versionType\": \"semver\"}], \"packageName\": \"keycloak\", \"collectionURL\": \"https://www.keycloak.org/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:build_keycloak:26\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Build of Keycloak\", \"packageName\": \"keycloak\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:build_keycloak:26\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat build of Keycloak 26\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:build_keycloak:26.0::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat build of Keycloak 26.0\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"26.0.11-2\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhbk/keycloak-operator-bundle\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:build_keycloak:26.0::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat build of Keycloak 26.0\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"26.0-12\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhbk/keycloak-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:build_keycloak:26.0::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat build of Keycloak 26.0\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"26.0-13\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhbk/keycloak-rhel9-operator\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:build_keycloak:26.2::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat build of Keycloak 26.2\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"26.2.5-1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhbk/keycloak-operator-bundle\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:build_keycloak:26.2::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat build of Keycloak 26.2\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"26.2-4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhbk/keycloak-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:build_keycloak:26.2::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat build of Keycloak 26.2\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"26.2-4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhbk/keycloak-rhel9-operator\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:red_hat_single_sign_on:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Single Sign-On 7\", \"packageName\": \"rh-sso7-keycloak\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-04-10T12:24:28.784Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-04-29T00:00:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-04-29T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2025:4335\", \"name\": \"RHSA-2025:4335\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:4336\", \"name\": \"RHSA-2025:4336\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8672\", \"name\": \"RHSA-2025:8672\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:8690\", \"name\": \"RHSA-2025:8690\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-3501\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2358834\", \"name\": \"RHBZ#2358834\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://github.com/keycloak/keycloak/issues/39350\"}, {\"url\": \"https://github.com/keycloak/keycloak/pull/39366\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Use the correct TLS configuration and avoid using \\\"--tls-hostname-verifier=any\\\".\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-297\", \"description\": \"Improper Validation of Certificate with Host Mismatch\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-11-20T07:27:01.176Z\"}, \"x_redhatCweChain\": \"CWE-297: Improper Validation of Certificate with Host Mismatch\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-3501\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-20T07:27:01.176Z\", \"dateReserved\": \"2025-04-10T12:29:29.427Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-04-29T20:45:29.507Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2025:4336
Vulnerability from csaf_redhat - Published: 2025-04-29 22:53 - Updated: 2026-05-06 16:52A flaw was found in Keycloak. When the configuration uses JWT tokens for authentication, the tokens are cached until expiration. If a client uses JWT tokens with an excessively long expiration time, for example, 24 or 48 hours, the cache can grow indefinitely, leading to an OutOfMemoryError. This issue could result in a denial of service condition, preventing legitimate users from accessing the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Build of Keycloak
Red Hat / Red Hat build of Keycloak
|
cpe:/a:redhat:build_keycloak:26
|
— |
Vendor Fix
fix
|
A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Build of Keycloak
Red Hat / Red Hat build of Keycloak
|
cpe:/a:redhat:build_keycloak:26
|
— |
Vendor Fix
fix
Workaround
|
A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Build of Keycloak
Red Hat / Red Hat build of Keycloak
|
cpe:/a:redhat:build_keycloak:26
|
— |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat build of Keycloak 26.0.11 packages are available from the Customer Portal",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat build of Keycloak 26.0.11 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nSecurity fixes:\n* JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak\n* Keycloak hostname verification\n* Two factor authentication bypass",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:4336",
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2353868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353868"
},
{
"category": "external",
"summary": "2358834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"category": "external",
"summary": "2361923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2361923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4336.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of Keycloak 26.0.11 Update",
"tracking": {
"current_release_date": "2026-05-06T16:52:47+00:00",
"generator": {
"date": "2026-05-06T16:52:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2025:4336",
"initial_release_date": "2025-04-29T22:53:23+00:00",
"revision_history": [
{
"date": "2025-04-29T22:53:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-04-29T22:53:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T16:52:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Build of Keycloak",
"product": {
"name": "Red Hat Build of Keycloak",
"product_id": "Red Hat Build of Keycloak",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:build_keycloak:26"
}
}
}
],
"category": "product_family",
"name": "Red Hat build of Keycloak"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2559",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-03-20T11:46:08.046000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. When the configuration uses JWT tokens for authentication, the tokens are cached until expiration. If a client uses JWT tokens with an excessively long expiration time, for example, 24 or 48 hours, the cache can grow indefinitely, leading to an OutOfMemoryError. This issue could result in a denial of service condition, preventing legitimate users from accessing the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.keycloak/keycloak-services: JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of Keycloak"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-2559"
},
{
"category": "external",
"summary": "RHBZ#2353868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-2559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-2559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2559"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/commit/a10c8119d4452b866b90a9019b2cc159919276ca",
"url": "https://github.com/keycloak/keycloak/commit/a10c8119d4452b866b90a9019b2cc159919276ca"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/issues/38576",
"url": "https://github.com/keycloak/keycloak/issues/38576"
}
],
"release_date": "2025-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-29T22:53:23+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"Red Hat Build of Keycloak"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Build of Keycloak"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.keycloak/keycloak-services: JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak"
},
{
"cve": "CVE-2025-3501",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"discovery_date": "2025-04-10T12:24:28.784000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358834"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.keycloak.protocol.services: Keycloak hostname verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has rated this as an Important severity, although this configuration is not recommended, especially in production environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of Keycloak"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-3501"
},
{
"category": "external",
"summary": "RHBZ#2358834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-3501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/issues/39350",
"url": "https://github.com/keycloak/keycloak/issues/39350"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/pull/39366",
"url": "https://github.com/keycloak/keycloak/pull/39366"
}
],
"release_date": "2025-04-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-29T22:53:23+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"Red Hat Build of Keycloak"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"category": "workaround",
"details": "Use the correct TLS configuration and avoid using \"--tls-hostname-verifier=any\".",
"product_ids": [
"Red Hat Build of Keycloak"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of Keycloak"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.keycloak.protocol.services: Keycloak hostname verification"
},
{
"acknowledgments": [
{
"names": [
"Marek Posolda"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-3910",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2025-04-23T19:23:26.537000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2361923"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.keycloak.authentication: Two factor authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of Keycloak"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-3910"
},
{
"category": "external",
"summary": "RHBZ#2361923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2361923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-3910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3910"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-3910",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3910"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/issues/39349",
"url": "https://github.com/keycloak/keycloak/issues/39349"
}
],
"release_date": "2025-04-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-29T22:53:23+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"Red Hat Build of Keycloak"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"category": "workaround",
"details": "No current mitigations are available for this vulnerability.",
"product_ids": [
"Red Hat Build of Keycloak"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of Keycloak"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.keycloak.authentication: Two factor authentication bypass"
}
]
}
RHSA-2025:8690
Vulnerability from csaf_redhat - Published: 2025-06-09 13:57 - Updated: 2026-05-06 15:25A flaw was found in the XStream library. A remote attacker may trigger a denial of service by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. This issue may lead to the termination of the application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat build of Keycloak 26
Red Hat / Red Hat build of Keycloak
|
cpe:/a:redhat:build_keycloak:26
|
— |
Vendor Fix
fix
Workaround
|
A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat build of Keycloak 26
Red Hat / Red Hat build of Keycloak
|
cpe:/a:redhat:build_keycloak:26
|
— |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat build of Keycloak 26.2.5 packages are available from the Customer Portal",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat build of Keycloak 26.2.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nSecurity fixes:\n* XStream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream (CVE-2024-47072)\n* Keycloak hostname verification (CVE-2025-3501)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:8690",
"url": "https://access.redhat.com/errata/RHSA-2025:8690"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_8690.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of Keycloak 26.2.5 Security Update",
"tracking": {
"current_release_date": "2026-05-06T15:25:33+00:00",
"generator": {
"date": "2026-05-06T15:25:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2025:8690",
"initial_release_date": "2025-06-09T13:57:15+00:00",
"revision_history": [
{
"date": "2025-06-09T13:57:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-06-09T13:57:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T15:25:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat build of Keycloak 26",
"product": {
"name": "Red Hat build of Keycloak 26",
"product_id": "Red Hat build of Keycloak 26",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:build_keycloak:26"
}
}
}
],
"category": "product_family",
"name": "Red Hat build of Keycloak"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-11-08T13:47:39.374198+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2324606"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the XStream library. A remote attacker may trigger a denial of service by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. This issue may lead to the termination of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in XStream is considered an Important severity rather than Moderate because it exposes applications to a denial of service (DoS) attack with relative ease. By exploiting the flaw in the `BinaryStreamDriver`, an attacker can manipulate the binary input stream to trigger a stack overflow, which terminates the application unexpectedly. Unlike moderate vulnerabilities, which may require specific conditions or limited privileges, this flaw enables remote attackers to forcefully terminate services by crafting malicious input, impacting system availability. Additionally, the vulnerability\u2019s reliance on a common serialization mechanism elevates the risk, as it may affect applications across various environments and industries where XStream is deployed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat build of Keycloak 26"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47072"
},
{
"category": "external",
"summary": "RHBZ#2324606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47072"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47072",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47072"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/commit/bb838ce2269cac47433e31c77b2b236466e9f266",
"url": "https://github.com/x-stream/xstream/commit/bb838ce2269cac47433e31c77b2b236466e9f266"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-hfq9-hggm-c56q",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hfq9-hggm-c56q"
},
{
"category": "external",
"summary": "https://x-stream.github.io/CVE-2024-47072.html",
"url": "https://x-stream.github.io/CVE-2024-47072.html"
}
],
"release_date": "2024-11-07T23:38:52.978000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-09T13:57:15+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"Red Hat build of Keycloak 26"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8690"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat build of Keycloak 26"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat build of Keycloak 26"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream"
},
{
"cve": "CVE-2025-3501",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"discovery_date": "2025-04-10T12:24:28.784000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358834"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.keycloak.protocol.services: Keycloak hostname verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has rated this as an Important severity, although this configuration is not recommended, especially in production environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat build of Keycloak 26"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-3501"
},
{
"category": "external",
"summary": "RHBZ#2358834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-3501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/issues/39350",
"url": "https://github.com/keycloak/keycloak/issues/39350"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/pull/39366",
"url": "https://github.com/keycloak/keycloak/pull/39366"
}
],
"release_date": "2025-04-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-09T13:57:15+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"Red Hat build of Keycloak 26"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8690"
},
{
"category": "workaround",
"details": "Use the correct TLS configuration and avoid using \"--tls-hostname-verifier=any\".",
"product_ids": [
"Red Hat build of Keycloak 26"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat build of Keycloak 26"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.keycloak.protocol.services: Keycloak hostname verification"
}
]
}
RHSA-2025:4335
Vulnerability from csaf_redhat - Published: 2025-04-29 23:01 - Updated: 2026-05-06 16:52A flaw was found in Keycloak. When the configuration uses JWT tokens for authentication, the tokens are cached until expiration. If a client uses JWT tokens with an excessively long expiration time, for example, 24 or 48 hours, the cache can grow indefinitely, leading to an OutOfMemoryError. This issue could result in a denial of service condition, preventing legitimate users from accessing the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le | — |
Vendor Fix
fix
|
A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le | — |
Vendor Fix
fix
Workaround
|
A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New images are available for Red Hat build of Keycloak 26.0.11 and Red Hat build of Keycloak 26.0.11 Operator, running on OpenShift Container Platform",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat build of Keycloak is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat build of Keycloak for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services.\nRed Hat build of Keycloak Operator for OpenShift simplifies deployment and management of Keycloak 26.0.11 clusters.\nThis erratum releases new images for Red Hat build of Keycloak 26.0.11 for use within the OpenShift Container Platform cloud computing Platform-as-a-Service (PaaS) for on-premise or private cloud deployments, aligning with the standalone product release.\n\nSecurity fixes:\n* JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak\n* Keycloak hostname verification\n* Two factor authentication bypass",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:4335",
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2353868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353868"
},
{
"category": "external",
"summary": "2358834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"category": "external",
"summary": "2361923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2361923"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4335.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of Keycloak 26.0.11 Images Update",
"tracking": {
"current_release_date": "2026-05-06T16:52:46+00:00",
"generator": {
"date": "2026-05-06T16:52:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2025:4335",
"initial_release_date": "2025-04-29T23:01:37+00:00",
"revision_history": [
{
"date": "2025-04-29T23:01:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-04-29T23:01:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T16:52:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat build of Keycloak 26.0",
"product": {
"name": "Red Hat build of Keycloak 26.0",
"product_id": "9Base-RHBK-26.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:build_keycloak:26.0::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat build of Keycloak"
},
{
"branches": [
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"product": {
"name": "rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"product_id": "rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189?arch=s390x\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9\u0026tag=26.0-1745967474"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"product": {
"name": "rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"product_id": "rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec?arch=s390x\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator\u0026tag=26.0-1745967472"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"product": {
"name": "rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"product_id": "rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286?arch=amd64\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9\u0026tag=26.0-1745967474"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"product": {
"name": "rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"product_id": "rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1?arch=amd64\u0026repository_url=registry.redhat.io/rhbk/keycloak-operator-bundle\u0026tag=26.0.11-2"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"product": {
"name": "rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"product_id": "rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf?arch=amd64\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator\u0026tag=26.0-1745967472"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le",
"product": {
"name": "rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le",
"product_id": "rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9\u0026tag=26.0-1745967474"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"product": {
"name": "rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"product_id": "rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator\u0026tag=26.0-1745967472"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64 as a component of Red Hat build of Keycloak 26.0",
"product_id": "9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64"
},
"product_reference": "rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"relates_to_product_reference": "9Base-RHBK-26.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64 as a component of Red Hat build of Keycloak 26.0",
"product_id": "9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64"
},
"product_reference": "rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"relates_to_product_reference": "9Base-RHBK-26.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le as a component of Red Hat build of Keycloak 26.0",
"product_id": "9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le"
},
"product_reference": "rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"relates_to_product_reference": "9Base-RHBK-26.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x as a component of Red Hat build of Keycloak 26.0",
"product_id": "9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x"
},
"product_reference": "rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"relates_to_product_reference": "9Base-RHBK-26.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64 as a component of Red Hat build of Keycloak 26.0",
"product_id": "9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64"
},
"product_reference": "rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"relates_to_product_reference": "9Base-RHBK-26.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x as a component of Red Hat build of Keycloak 26.0",
"product_id": "9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x"
},
"product_reference": "rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"relates_to_product_reference": "9Base-RHBK-26.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le as a component of Red Hat build of Keycloak 26.0",
"product_id": "9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
},
"product_reference": "rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le",
"relates_to_product_reference": "9Base-RHBK-26.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2559",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-03-20T11:46:08.046000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. When the configuration uses JWT tokens for authentication, the tokens are cached until expiration. If a client uses JWT tokens with an excessively long expiration time, for example, 24 or 48 hours, the cache can grow indefinitely, leading to an OutOfMemoryError. This issue could result in a denial of service condition, preventing legitimate users from accessing the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.keycloak/keycloak-services: JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-2559"
},
{
"category": "external",
"summary": "RHBZ#2353868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-2559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-2559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2559"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/commit/a10c8119d4452b866b90a9019b2cc159919276ca",
"url": "https://github.com/keycloak/keycloak/commit/a10c8119d4452b866b90a9019b2cc159919276ca"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/issues/38576",
"url": "https://github.com/keycloak/keycloak/issues/38576"
}
],
"release_date": "2025-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-29T23:01:37+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.keycloak/keycloak-services: JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak"
},
{
"cve": "CVE-2025-3501",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"discovery_date": "2025-04-10T12:24:28.784000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358834"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.keycloak.protocol.services: Keycloak hostname verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has rated this as an Important severity, although this configuration is not recommended, especially in production environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-3501"
},
{
"category": "external",
"summary": "RHBZ#2358834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-3501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/issues/39350",
"url": "https://github.com/keycloak/keycloak/issues/39350"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/pull/39366",
"url": "https://github.com/keycloak/keycloak/pull/39366"
}
],
"release_date": "2025-04-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-29T23:01:37+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"category": "workaround",
"details": "Use the correct TLS configuration and avoid using \"--tls-hostname-verifier=any\".",
"product_ids": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.keycloak.protocol.services: Keycloak hostname verification"
},
{
"acknowledgments": [
{
"names": [
"Marek Posolda"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-3910",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2025-04-23T19:23:26.537000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2361923"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.keycloak.authentication: Two factor authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-3910"
},
{
"category": "external",
"summary": "RHBZ#2361923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2361923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-3910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3910"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-3910",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3910"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/issues/39349",
"url": "https://github.com/keycloak/keycloak/issues/39349"
}
],
"release_date": "2025-04-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-29T23:01:37+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"category": "workaround",
"details": "No current mitigations are available for this vulnerability.",
"product_ids": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHBK-26.0:rhbk/keycloak-operator-bundle@sha256:67a4498b9c68a7068cc2bcfa2d7d5eb35e6ec7e281c0886893f4125a6487c8a1_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:83c90cf0627a1b99900d539f417e648d8be4c9966452872a93a8236e17b1d1cf_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:8e1a37dc9fa7b99a65ac9997d49bc9991172a461c63196614d1975bc2210e7fa_ppc64le",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:67699f3ec6e1a489b769523d9deaeec57a8113259d375501aa043778828c2286_amd64",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:76f2963c284d0a79e6026bee0837639bce5af84a18c994828aa0890923725189_s390x",
"9Base-RHBK-26.0:rhbk/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.keycloak.authentication: Two factor authentication bypass"
}
]
}
RHSA-2025:8672
Vulnerability from csaf_redhat - Published: 2025-06-09 12:40 - Updated: 2026-05-06 15:25A flaw was found in the XStream library. A remote attacker may trigger a denial of service by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. This issue may lead to the termination of the application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New images are available for Red Hat build of Keycloak 26.2.5 and Red Hat build of Keycloak 26.2.5 Operator, running on OpenShift Container Platform",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat build of Keycloak is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat build of Keycloak for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services.\nRed Hat build of Keycloak Operator for OpenShift simplifies deployment and management of Keycloak 26.2.5 clusters.\nThis erratum releases new images for Red Hat build of Keycloak 26.2.5 for use within the OpenShift Container Platform cloud computing Platform-as-a-Service (PaaS) for on-premise or private cloud deployments, aligning with the standalone product release.\n\nSecurity fixes:\n* XStream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream (CVE-2024-47072)\n* Keycloak hostname verification (CVE-2025-3501)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:8672",
"url": "https://access.redhat.com/errata/RHSA-2025:8672"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_8672.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of Keycloak 26.2.5 Images Security Update",
"tracking": {
"current_release_date": "2026-05-06T15:25:33+00:00",
"generator": {
"date": "2026-05-06T15:25:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2025:8672",
"initial_release_date": "2025-06-09T12:40:44+00:00",
"revision_history": [
{
"date": "2025-06-09T12:40:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-06-09T12:40:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-06T15:25:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat build of Keycloak 26.2",
"product": {
"name": "Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:build_keycloak:26.2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat build of Keycloak"
},
{
"branches": [
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"product": {
"name": "rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"product_id": "rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9\u0026tag=26.2-4"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"product": {
"name": "rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"product_id": "rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator\u0026tag=26.2-4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"product": {
"name": "rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"product_id": "rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb?arch=s390x\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9\u0026tag=26.2-4"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"product": {
"name": "rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"product_id": "rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1?arch=s390x\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator\u0026tag=26.2-4"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64",
"product": {
"name": "rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64",
"product_id": "rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa?arch=amd64\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9\u0026tag=26.2-4"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"product": {
"name": "rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"product_id": "rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f?arch=amd64\u0026repository_url=registry.redhat.io/rhbk/keycloak-operator-bundle\u0026tag=26.2.5-1"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"product": {
"name": "rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"product_id": "rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a?arch=amd64\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator\u0026tag=26.2-4"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"product": {
"name": "rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"product_id": "rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70?arch=arm64\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9\u0026tag=26.2-4"
}
}
},
{
"category": "product_version",
"name": "rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"product": {
"name": "rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"product_id": "rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83?arch=arm64\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator\u0026tag=26.2-4"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64 as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64"
},
"product_reference": "rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"relates_to_product_reference": "9Base-RHBK-26.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le"
},
"product_reference": "rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"relates_to_product_reference": "9Base-RHBK-26.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x"
},
"product_reference": "rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"relates_to_product_reference": "9Base-RHBK-26.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64 as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64"
},
"product_reference": "rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"relates_to_product_reference": "9Base-RHBK-26.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64 as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64"
},
"product_reference": "rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"relates_to_product_reference": "9Base-RHBK-26.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x"
},
"product_reference": "rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"relates_to_product_reference": "9Base-RHBK-26.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64 as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64"
},
"product_reference": "rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"relates_to_product_reference": "9Base-RHBK-26.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le"
},
"product_reference": "rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"relates_to_product_reference": "9Base-RHBK-26.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64 as a component of Red Hat build of Keycloak 26.2",
"product_id": "9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
},
"product_reference": "rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64",
"relates_to_product_reference": "9Base-RHBK-26.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-11-08T13:47:39.374198+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2324606"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the XStream library. A remote attacker may trigger a denial of service by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. This issue may lead to the termination of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in XStream is considered an Important severity rather than Moderate because it exposes applications to a denial of service (DoS) attack with relative ease. By exploiting the flaw in the `BinaryStreamDriver`, an attacker can manipulate the binary input stream to trigger a stack overflow, which terminates the application unexpectedly. Unlike moderate vulnerabilities, which may require specific conditions or limited privileges, this flaw enables remote attackers to forcefully terminate services by crafting malicious input, impacting system availability. Additionally, the vulnerability\u2019s reliance on a common serialization mechanism elevates the risk, as it may affect applications across various environments and industries where XStream is deployed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47072"
},
{
"category": "external",
"summary": "RHBZ#2324606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2324606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47072"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47072",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47072"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/commit/bb838ce2269cac47433e31c77b2b236466e9f266",
"url": "https://github.com/x-stream/xstream/commit/bb838ce2269cac47433e31c77b2b236466e9f266"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-hfq9-hggm-c56q",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hfq9-hggm-c56q"
},
{
"category": "external",
"summary": "https://x-stream.github.io/CVE-2024-47072.html",
"url": "https://x-stream.github.io/CVE-2024-47072.html"
}
],
"release_date": "2024-11-07T23:38:52.978000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-09T12:40:44+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8672"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream"
},
{
"cve": "CVE-2025-3501",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"discovery_date": "2025-04-10T12:24:28.784000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358834"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.keycloak.protocol.services: Keycloak hostname verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has rated this as an Important severity, although this configuration is not recommended, especially in production environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-3501"
},
{
"category": "external",
"summary": "RHBZ#2358834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-3501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/issues/39350",
"url": "https://github.com/keycloak/keycloak/issues/39350"
},
{
"category": "external",
"summary": "https://github.com/keycloak/keycloak/pull/39366",
"url": "https://github.com/keycloak/keycloak/pull/39366"
}
],
"release_date": "2025-04-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-09T12:40:44+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.",
"product_ids": [
"9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:8672"
},
{
"category": "workaround",
"details": "Use the correct TLS configuration and avoid using \"--tls-hostname-verifier=any\".",
"product_ids": [
"9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHBK-26.2:rhbk/keycloak-operator-bundle@sha256:4ecfe1e2059cc2d7087e01ae04598bd5628f2958c21e14e41fa249dccf0d3e5f_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2a85cb76b1d5cd7cf2a8b0d809249470b049ae5b8de32186ceac4ae13e7758e3_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:2cb97ec2a8ac79b31a678d348b2217e008d39b1f8482e75c1baf8acc026910c1_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:35d37a09fa0a9799258aede346e1cb205179617ab2e417c809e18dee2ed1860a_amd64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9-operator@sha256:c9d86fff34b796441318e5fd211b69f07b4aaacfd49f7d2b02d972329cb61d83_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:55062a4e89ec53f2759aeb7fe5f117a658e182ee898a78074f47330943ff14eb_s390x",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:b87e36a465c9a84edc7b74ac46ca555cd5189731eaeec9da7f05f1e41cc86e70_arm64",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e24acc11a1bc60321cec78a5f2bc2521636fe00fddd9e742d7b25131f3152c5a_ppc64le",
"9Base-RHBK-26.2:rhbk/keycloak-rhel9@sha256:e3e211f233016ade5c98aa16f979d97a90c8af369bc81cd526e2a40e53ed4daa_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "org.keycloak.protocol.services: Keycloak hostname verification"
}
]
}
GHSA-R934-W73G-V4P8
Vulnerability from github – Published: 2025-04-29 21:31 – Updated: 2025-06-09 15:31Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-hw58-3793-42gg. This link is maintained to preserve external references.
Original Description
A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-services"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "26.2.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-297"
],
"github_reviewed": true,
"github_reviewed_at": "2025-04-30T17:24:10Z",
"nvd_published_at": "2025-04-29T21:15:51Z",
"severity": "HIGH"
},
"details": "# Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-hw58-3793-42gg. This link is maintained to preserve external references.\n\n# Original Description\nA flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended.",
"id": "GHSA-r934-w73g-v4p8",
"modified": "2025-06-09T15:31:36Z",
"published": "2025-04-29T21:31:56Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8672"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:8690"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-3501"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"type": "PACKAGE",
"url": "https://github.com/keycloak/keycloak"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Duplicate Advisory: Keycloak hostname verification",
"withdrawn": "2025-04-30T17:24:10Z"
}
GHSA-HW58-3793-42GG
Vulnerability from github – Published: 2025-04-30 17:24 – Updated: 2025-08-07 15:47A flaw was found in Keycloak. By setting a verification policy to 'ANY', the trust store certificate verification is skipped, which is unintended.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.keycloak:keycloak-services"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "26.2.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-3501"
],
"database_specific": {
"cwe_ids": [
"CWE-297"
],
"github_reviewed": true,
"github_reviewed_at": "2025-04-30T17:24:21Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "A flaw was found in Keycloak. By setting a verification policy to \u0027ANY\u0027, the trust store certificate verification is skipped, which is unintended.",
"id": "GHSA-hw58-3793-42gg",
"modified": "2025-08-07T15:47:35Z",
"published": "2025-04-30T17:24:21Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-hw58-3793-42gg"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3501"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/issues/39350"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/pull/39366"
},
{
"type": "WEB",
"url": "https://github.com/keycloak/keycloak/commit/99ca24c832729075e04d8bc58666089268314272"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-3501"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"type": "PACKAGE",
"url": "https://github.com/keycloak/keycloak"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Keycloak hostname verification"
}
NCSC-2025-0141
Vulnerability from csaf_ncscnl - Published: 2025-05-06 07:12 - Updated: 2025-05-06 07:12| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:rpm/26.0
Red Hat / Red Hat build of Keycloak 26.0
|
cpe:/a:redhat:build_keycloak:26.0::el9
|
vers:rpm/26.0 | |
|
vers:oci/26.0-1745967474
Red Hat / Red Hat build of Keycloak / keycloak-rhel9
|
pkg:oci/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0?arch=ppc64le&repository_url=registry.redhat.io/rhbk/keycloak-rhel9&tag=26.0-1745967474
|
vers:oci/26.0-1745967474 | |
|
vers:rpm/26.0-12
Red Hat / Red Hat build of Keycloak 26.0 / keycloak-rhel9
|
vers:rpm/26.0-12 | ||
|
vers:rpm/26.0-13
Red Hat / Red Hat build of Keycloak 26.0 / keycloak-rhel9-operator
|
vers:rpm/26.0-13 | ||
|
vers:oci/26.0-1745967472
Red Hat / Red Hat build of Keycloak / keycloak-rhel9-operator
|
pkg:oci/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec?arch=s390x&repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator&tag=26.0-1745967472
|
vers:oci/26.0-1745967472 | |
|
vers:rpm/unknown
Red Hat / Red Hat Build of Keycloak / org.keycloak.authentication
|
vers:rpm/unknown | ||
|
vers:unknown/<26.2.2
Open Source / Keycloak
|
vers:unknown/<26.2.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:rpm/26.0
Red Hat / Red Hat build of Keycloak 26.0
|
cpe:/a:redhat:build_keycloak:26.0::el9
|
vers:rpm/26.0 | |
|
vers:oci/26.0-1745967474
Red Hat / Red Hat build of Keycloak / keycloak-rhel9
|
pkg:oci/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0?arch=ppc64le&repository_url=registry.redhat.io/rhbk/keycloak-rhel9&tag=26.0-1745967474
|
vers:oci/26.0-1745967474 | |
|
vers:rpm/26.0-12
Red Hat / Red Hat build of Keycloak 26.0 / keycloak-rhel9
|
vers:rpm/26.0-12 | ||
|
vers:rpm/26.0-13
Red Hat / Red Hat build of Keycloak 26.0 / keycloak-rhel9-operator
|
vers:rpm/26.0-13 | ||
|
vers:oci/26.0-1745967472
Red Hat / Red Hat build of Keycloak / keycloak-rhel9-operator
|
pkg:oci/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec?arch=s390x&repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator&tag=26.0-1745967472
|
vers:oci/26.0-1745967472 | |
|
vers:rpm/unknown
Red Hat / Red Hat Build of Keycloak / org.keycloak.authentication
|
vers:rpm/unknown | ||
|
vers:unknown/<26.2.2
Open Source / Keycloak
|
vers:unknown/<26.2.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:rpm/26.0
Red Hat / Red Hat build of Keycloak 26.0
|
cpe:/a:redhat:build_keycloak:26.0::el9
|
vers:rpm/26.0 | |
|
vers:oci/26.0-1745967474
Red Hat / Red Hat build of Keycloak / keycloak-rhel9
|
pkg:oci/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0?arch=ppc64le&repository_url=registry.redhat.io/rhbk/keycloak-rhel9&tag=26.0-1745967474
|
vers:oci/26.0-1745967474 | |
|
vers:rpm/26.0-12
Red Hat / Red Hat build of Keycloak 26.0 / keycloak-rhel9
|
vers:rpm/26.0-12 | ||
|
vers:rpm/26.0-13
Red Hat / Red Hat build of Keycloak 26.0 / keycloak-rhel9-operator
|
vers:rpm/26.0-13 | ||
|
vers:oci/26.0-1745967472
Red Hat / Red Hat build of Keycloak / keycloak-rhel9-operator
|
pkg:oci/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec?arch=s390x&repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator&tag=26.0-1745967472
|
vers:oci/26.0-1745967472 | |
|
vers:rpm/unknown
Red Hat / Red Hat Build of Keycloak / org.keycloak.authentication
|
vers:rpm/unknown | ||
|
vers:unknown/<26.2.2
Open Source / Keycloak
|
vers:unknown/<26.2.2 |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Red Hat heeft kwetsbaarheden verholpen in Keycloak.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten een probleem waarbij JWT-tokens met lange vervaltijden kunnen leiden tot oneindige groei in de cache, wat kan resulteren in een OutOfMemoryError en een Denial-of-Service voor legitieme gebruikers. Daarnaast kan de verificatie van trust store-certificaten worden overgeslagen als het verificatiebeleid is ingesteld op \u0027ALL\u0027, wat kan leiden tot ongeautoriseerde toegang. Bovendien kan een kwetsbaarheid in het org.keycloak.authorization-pakket gebruikers in staat stellen om vereiste beveiligingsacties te omzeilen, zoals het inschakelen van twee-factor-authenticatie, wat de beveiliging van gebruikersaccounts in gevaar kan brengen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Red Hat heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - redhat",
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"category": "external",
"summary": "Source raw - redhat",
"url": "https://access.redhat.com/hydra/rest/securitydata/csaf/RHSA-2025:4335.json"
},
{
"category": "external",
"summary": "Source - redhat",
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"category": "external",
"summary": "Source raw - redhat",
"url": "https://access.redhat.com/hydra/rest/securitydata/csaf/RHSA-2025:4336.json"
}
],
"title": "Kwetsbaarheden verholpen in Keycloak",
"tracking": {
"current_release_date": "2025-05-06T07:12:42.075830Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0141",
"initial_release_date": "2025-05-06T07:12:42.075830Z",
"revision_history": [
{
"date": "2025-05-06T07:12:42.075830Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:rpm/26.0",
"product": {
"name": "vers:rpm/26.0",
"product_id": "CSAFPID-1764926",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:build_keycloak:26.0::el9"
}
}
}
],
"category": "product_name",
"name": "Red Hat build of Keycloak 26.0"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oci/26.0-1745967474",
"product": {
"name": "vers:oci/26.0-1745967474",
"product_id": "CSAFPID-2788738",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9@sha256:87ff67880fd7f44174b263759c99f4d701cf208eeb6f4abf636a10b98ec023d0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9\u0026tag=26.0-1745967474"
}
}
}
],
"category": "product_name",
"name": "keycloak-rhel9"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oci/26.0-1745967472",
"product": {
"name": "vers:oci/26.0-1745967472",
"product_id": "CSAFPID-2788737",
"product_identification_helper": {
"purl": "pkg:oci/keycloak-rhel9-operator@sha256:acd2a3adf7365e62689b79608c2289c804f47f97a81f9e8ddf3fecdce6d6f0ec?arch=s390x\u0026repository_url=registry.redhat.io/rhbk/keycloak-rhel9-operator\u0026tag=26.0-1745967472"
}
}
}
],
"category": "product_name",
"name": "keycloak-rhel9-operator"
}
],
"category": "product_family",
"name": "Red Hat build of Keycloak"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:rpm/26.0-12",
"product": {
"name": "vers:rpm/26.0-12",
"product_id": "CSAFPID-2789747"
}
}
],
"category": "product_name",
"name": "keycloak-rhel9"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:rpm/26.0-13",
"product": {
"name": "vers:rpm/26.0-13",
"product_id": "CSAFPID-2789748"
}
}
],
"category": "product_name",
"name": "keycloak-rhel9-operator"
}
],
"category": "product_family",
"name": "Red Hat build of Keycloak 26.0"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:rpm/unknown",
"product": {
"name": "vers:rpm/unknown",
"product_id": "CSAFPID-2789749"
}
}
],
"category": "product_name",
"name": "org.keycloak.authentication"
}
],
"category": "product_family",
"name": "Red Hat Build of Keycloak"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c26.2.2",
"product": {
"name": "vers:unknown/\u003c26.2.2",
"product_id": "CSAFPID-2788271"
}
}
],
"category": "product_name",
"name": "Keycloak"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2559",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1764926",
"CSAFPID-2788738",
"CSAFPID-2789747",
"CSAFPID-2789748",
"CSAFPID-2788737",
"CSAFPID-2789749",
"CSAFPID-2788271"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-2559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-2559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1764926",
"CSAFPID-2788738",
"CSAFPID-2789747",
"CSAFPID-2789748",
"CSAFPID-2788737",
"CSAFPID-2789749",
"CSAFPID-2788271"
]
}
],
"title": "CVE-2025-2559"
},
{
"cve": "CVE-2025-3501",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1764926",
"CSAFPID-2788738",
"CSAFPID-2789747",
"CSAFPID-2789748",
"CSAFPID-2788737",
"CSAFPID-2789749",
"CSAFPID-2788271"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3501",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-3501.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1764926",
"CSAFPID-2788738",
"CSAFPID-2789747",
"CSAFPID-2789748",
"CSAFPID-2788737",
"CSAFPID-2789749",
"CSAFPID-2788271"
]
}
],
"title": "CVE-2025-3501"
},
{
"cve": "CVE-2025-3910",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1764926",
"CSAFPID-2788738",
"CSAFPID-2789747",
"CSAFPID-2789748",
"CSAFPID-2788737",
"CSAFPID-2789749",
"CSAFPID-2788271"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3910",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-3910.json"
}
],
"title": "CVE-2025-3910"
}
]
}
FKIE_CVE-2025-3501
Vulnerability from fkie_nvd - Published: 2025-04-29 21:15 - Updated: 2026-04-15 00:35| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Keycloak. By setting a verification policy to \u0027ALL\u0027, the trust store certificate verification is skipped, which is unintended."
},
{
"lang": "es",
"value": "Se detect\u00f3 una falla en Keycloak. Al configurar la pol\u00edtica de verificaci\u00f3n como \"ALL\", se omite la verificaci\u00f3n del certificado del almac\u00e9n de confianza, lo cual es involuntario."
}
],
"id": "CVE-2025-3501",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2025-04-29T21:15:51.523",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8672"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:8690"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-3501"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358834"
},
{
"source": "secalert@redhat.com",
"url": "https://github.com/keycloak/keycloak/issues/39350"
},
{
"source": "secalert@redhat.com",
"url": "https://github.com/keycloak/keycloak/pull/39366"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-297"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-0908
Vulnerability from csaf_certbund - Published: 2025-04-29 22:00 - Updated: 2025-06-09 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Keycloak <26.2.2
Open Source / Keycloak
|
<26.2.2 | ||
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Red Hat Enterprise Linux build of Keycloak <26.0.11
Red Hat / Enterprise Linux
|
build of Keycloak <26.0.11 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Keycloak <26.2.2
Open Source / Keycloak
|
<26.2.2 | ||
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Red Hat Enterprise Linux build of Keycloak <26.0.11
Red Hat / Enterprise Linux
|
build of Keycloak <26.0.11 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Keycloak erm\u00f6glicht Single Sign-On mit Identity and Access Management f\u00fcr moderne Anwendungen und Dienste.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Keycloack ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0908 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0908.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0908 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0908"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2025-04-29",
"url": "https://github.com/advisories/GHSA-r934-w73g-v4p8"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2025-04-29",
"url": "https://github.com/advisories/GHSA-fx44-2wx5-5fvp"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2025-04-29",
"url": "https://access.redhat.com/errata/RHSA-2025:4335"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2025-04-29",
"url": "https://access.redhat.com/errata/RHSA-2025:4336"
},
{
"category": "external",
"summary": "Keycloak 26.2.2 released",
"url": "https://www.keycloak.org/2025/04/keycloak-2622-released"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8672 vom 2025-06-09",
"url": "https://access.redhat.com/errata/RHSA-2025:8672"
}
],
"source_lang": "en-US",
"title": "Keycloack: Mehrere Schwachstellen erm\u00f6glichen Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2025-06-09T22:00:00.000+00:00",
"generator": {
"date": "2025-06-10T08:25:40.456+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0908",
"initial_release_date": "2025-04-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c26.2.2",
"product": {
"name": "Open Source Keycloak \u003c26.2.2",
"product_id": "T043249"
}
},
{
"category": "product_version",
"name": "26.2.2",
"product": {
"name": "Open Source Keycloak 26.2.2",
"product_id": "T043249-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:keycloak:keycloak:26.2.2"
}
}
}
],
"category": "product_name",
"name": "Keycloak"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version_range",
"name": "build of Keycloak \u003c26.0.11",
"product": {
"name": "Red Hat Enterprise Linux build of Keycloak \u003c26.0.11",
"product_id": "T043219"
}
},
{
"category": "product_version",
"name": "build of Keycloak 26.0.11",
"product": {
"name": "Red Hat Enterprise Linux build of Keycloak 26.0.11",
"product_id": "T043219-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:build_of_keycloak__26.0.11"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3501",
"product_status": {
"known_affected": [
"T043249",
"67646",
"T043219"
]
},
"release_date": "2025-04-29T22:00:00.000+00:00",
"title": "CVE-2025-3501"
},
{
"cve": "CVE-2025-3910",
"product_status": {
"known_affected": [
"T043249",
"67646",
"T043219"
]
},
"release_date": "2025-04-29T22:00:00.000+00:00",
"title": "CVE-2025-3910"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.