CVE Vulnerabilities

CVE-2025-8419

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Published: Aug 06, 2025 | Modified: Sep 04, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu

A vulnerability was found in Keycloak-services. Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 characters (limited local part of the email), so the attack is limited to very shorts emails (subject and little data, the example is 60 chars). This flaws only direct consequence is an unsolicited email being sent from the Keycloak server. However, this action could be a precursor for more sophisticated attacks.

Weakness

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

Affected Software

Name Vendor Start Version End Version
Keycloak Redhat - (including) - (including)
Red Hat build of Keycloak 26.0 RedHat org.keycloak/keycloak-services *
Red Hat build of Keycloak 26.0 RedHat rhbk/keycloak-operator-bundle:26.0.15-1 *
Red Hat build of Keycloak 26.0 RedHat rhbk/keycloak-rhel9:26.0-18 *
Red Hat build of Keycloak 26.0 RedHat rhbk/keycloak-rhel9-operator:26.0-19 *
Red Hat build of Keycloak 26.2 RedHat org.keycloak/keycloak-services *
Red Hat build of Keycloak 26.2 RedHat rhbk/keycloak-operator-bundle:26.2.8-1 *
Red Hat build of Keycloak 26.2 RedHat rhbk/keycloak-rhel9:26.2-8 *
Red Hat build of Keycloak 26.2 RedHat rhbk/keycloak-rhel9-operator:26.2-8 *

Potential Mitigations

References