First published: Mon Jan 20 2025(Updated: )
A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-ldap-federation | <=26.1.0 | |
Red Hat Keycloak |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0604 is classified as a high-severity vulnerability due to the potential unauthorized access it allows.
To mitigate CVE-2025-0604, ensure you configure Keycloak to properly validate user credentials with an LDAP bind during password resets.
CVE-2025-0604 affects Keycloak versions up to and including 26.1.0 in the keycloak-ldap-federation package.
CVE-2025-0604 allows users with expired or disabled Active Directory accounts to regain access to Keycloak.
Yes, CVE-2025-0604 specifically involves a vulnerability in Keycloak related to password resets for Active Directory users.