CVE Vulnerabilities

CVE-2025-7365

Origin Validation Error

Published: Jul 10, 2025 | Modified: Jan 08, 2026
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.1 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to review profile information. This vulnerability allows the attacker to modify their email address to match that of a victims account, triggering a verification email sent to the victims email address. The attackers email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victims account.

Weakness

The product does not properly verify that the source of data or communication is valid.

Affected Software

NameVendorStart VersionEnd Version
KeycloakRedhat- (including)- (including)
Red Hat build of Keycloak 26RedHatorg.keycloak/keycloak-services*
Red Hat build of Keycloak 26RedHatorg.keycloak/keycloak-services*
Red Hat build of Keycloak 26.0RedHatrhbk/keycloak-operator-bundle:26.0.13-2*
Red Hat build of Keycloak 26.0RedHatrhbk/keycloak-rhel9:26.0-16*
Red Hat build of Keycloak 26.0RedHatrhbk/keycloak-rhel9-operator:26.0-17*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-operator-bundle:26.2.6-1*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9:26.2-6*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9-operator:26.2-6*

References