SB2025090932 - Multiple vulnerabilities in Red Hat build of Keycloak 26.0



SB2025090932 - Multiple vulnerabilities in Red Hat build of Keycloak 26.0

Published: September 9, 2025 Updated: October 9, 2025

Security Bulletin ID SB2025090932
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2025-9162)

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input within the keycloak-model-storage-service component. The KeycloakRealmImport custom resource substitutes placeholders within imported realm documents, potentially referencing environment variables. A remote privileged user can inject malicious content during the realm import procedure and gain access to sensitive information. 


2) Command Injection (CVE-ID: CVE-2025-8419)

The vulnerability allows a remote attacker to execute arbitrary SMTP commands.

The vulnerability exists due to insufficient input validation during e-mail registration. A remote attacker can pass specially crafted data to the application and send out e-mail messages.



Remediation

Install update from vendor's website.