CVE-2025-13467

MEDIUM

Org.keycloak Keycloak-ldap-federation - Insecure Deserialization

Title source: rule
STIX 2.1

Description

A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.

References (8)

Core 8
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:22089
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:22088
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:22090
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:22091
Vendor Advisory vdb-entry x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2025-13467
Issue Tracking issue-tracking x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2416038

Scores

CVSS v3 5.5
EPSS 0.0006
EPSS Percentile 19.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-502
Status published
Products (9)
Keycloak/Keycloak < 26.4.6
org.keycloak/keycloak-ldap-federation 26.3.0 - 26.4.6Maven
Red Hat/Red Hat build of Keycloak 26.2 26.2-12
Red Hat/Red Hat build of Keycloak 26.2 26.2.11-1
Red Hat/Red Hat build of Keycloak 26.2.11
Red Hat/Red Hat build of Keycloak 26.4 26.4-5
Red Hat/Red Hat build of Keycloak 26.4 26.4-6
Red Hat/Red Hat build of Keycloak 26.4 26.4.6-1
Red Hat/Red Hat build of Keycloak 26.4.6
Published Nov 25, 2025
Tracked Since Feb 18, 2026