๐Ÿ” CVE Alert

CVE-2025-0604

MEDIUM 5.4

Keycloak-ldap-federation: authentication bypass due to missing ldap bind after password reset in keycloak

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions.

CWE CWE-287
Published Jan 22, 2025
Last Updated Jan 29, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

Red Hat / Red Hat Build of Keycloak
All versions affected
Red Hat / Red Hat build of Keycloak 26.0
All versions affected
Red Hat / Red Hat build of Keycloak 26.0
All versions affected
Red Hat / Red Hat build of Keycloak 26.0
All versions affected
Red Hat / Red Hat Single Sign-On 7
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2544 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2545 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-0604 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2338993

Credits

Red Hat would like to thank Dwayne Du for reporting this issue.