First published: Thu Apr 10 2025(Updated: )
A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Keycloak | ||
maven/org.keycloak:keycloak-services | <26.2.2 | 26.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3501 has been rated as a critical severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2025-3501, upgrade to Keycloak version 26.2.2 or later.
CVE-2025-3501 is caused by a flaw in Keycloak where setting a verification policy to 'ALL' skips the trust store certificate verification.
The risks associated with CVE-2025-3501 include the ability for attackers to impersonate trusted services by exploiting weak certificate validation.
CVE-2025-3501 affects specific versions of Keycloak prior to the fix provided in version 26.2.2.