Home

Description

A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.

PUBLISHED Reserved 2025-11-20 | Published 2025-11-25 | Updated 2025-11-27 | Assigner redhat




MEDIUM: 5.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

Problem types

Deserialization of Untrusted Data

Product status

Default status
affected

26.2.11-1 (rpm) before *
unaffected

Default status
affected

26.2-12 (rpm) before *
unaffected

Default status
affected

26.2-12 (rpm) before *
unaffected

Default status
unaffected

Default status
affected

26.4.6-1 (rpm) before *
unaffected

Default status
affected

26.4-6 (rpm) before *
unaffected

Default status
affected

26.4-5 (rpm) before *
unaffected

Default status
unaffected

Timeline

2025-11-20:Reported to Red Hat.
2025-11-25:Made public.

Credits

Red Hat would like to thank Icare & truff (YWH) for reporting this issue.

References

access.redhat.com/errata/RHSA-2025:22088 (RHSA-2025:22088) vendor-advisory

access.redhat.com/errata/RHSA-2025:22089 (RHSA-2025:22089) vendor-advisory

access.redhat.com/errata/RHSA-2025:22090 (RHSA-2025:22090) vendor-advisory

access.redhat.com/errata/RHSA-2025:22091 (RHSA-2025:22091) vendor-advisory

access.redhat.com/security/cve/CVE-2025-13467 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2416038 (RHBZ#2416038) issue-tracking

cve.org (CVE-2025-13467)

nvd.nist.gov (CVE-2025-13467)

Download JSON