We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-7365

Keycloak: phishing attack via email verification step in first login flow



Description

A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.

Reserved 2025-07-08 | Published 2025-07-10 | Updated 2025-07-10 | Assigner redhat


MEDIUM: 5.4CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N

Problem types

Origin Validation Error

Product status

Default status
affected

Timeline

2025-07-08:Reported to Red Hat.
2025-06-20:Made public.

References

access.redhat.com/security/cve/CVE-2025-7365 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2378852 (RHBZ#2378852) issue-tracking

cve.org (CVE-2025-7365)

nvd.nist.gov (CVE-2025-7365)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-7365

Support options

Helpdesk Chat, Email, Knowledgebase