CVE Vulnerabilities

CVE-2025-8419

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Published: Aug 06, 2025 | Modified: Jan 08, 2026
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

A vulnerability was found in Keycloak-services. Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 characters (limited local part of the email), so the attack is limited to very shorts emails (subject and little data, the example is 60 chars). This flaws only direct consequence is an unsolicited email being sent from the Keycloak server. However, this action could be a precursor for more sophisticated attacks.

Weakness

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

Affected Software

NameVendorStart VersionEnd Version
KeycloakRedhat- (including)- (including)
Red Hat build of Keycloak 26.0RedHatorg.keycloak/keycloak-services*
Red Hat build of Keycloak 26.0RedHatrhbk/keycloak-operator-bundle:26.0.15-1*
Red Hat build of Keycloak 26.0RedHatrhbk/keycloak-rhel9:26.0-18*
Red Hat build of Keycloak 26.0RedHatrhbk/keycloak-rhel9-operator:26.0-19*
Red Hat build of Keycloak 26.2RedHatorg.keycloak/keycloak-services*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-operator-bundle:26.2.8-1*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9:26.2-8*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9-operator:26.2-8*

Potential Mitigations

References