CVE-2025-0604
Keycloak-ldap-federation: authentication bypass due to missing ldap bind after password reset in keycloak
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions.
| CWE | CWE-287 |
| Published | Jan 22, 2025 |
| Last Updated | Jan 29, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new medium vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Red Hat / Red Hat Build of Keycloak
All versions affected Red Hat / Red Hat build of Keycloak 26.0
All versions affected Red Hat / Red Hat build of Keycloak 26.0
All versions affected Red Hat / Red Hat build of Keycloak 26.0
All versions affected Red Hat / Red Hat Single Sign-On 7
All versions affected References
Credits
Red Hat would like to thank Dwayne Du for reporting this issue.