A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
History

Fri, 02 May 2025 02:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 30 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Apr 2025 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:build_keycloak:26
References

Tue, 29 Apr 2025 23:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:build_keycloak: cpe:/a:redhat:build_keycloak:26.0::el9
References

Tue, 29 Apr 2025 21:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
Title Org.keycloak.protocol.services: keycloak hostname verification
First Time appeared Redhat
Redhat build Keycloak
Redhat red Hat Single Sign On
Weaknesses CWE-297
CPEs cpe:/a:redhat:build_keycloak:
cpe:/a:redhat:red_hat_single_sign_on:7
Vendors & Products Redhat
Redhat build Keycloak
Redhat red Hat Single Sign On
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-04-29T20:45:29.507Z

Updated: 2025-04-30T15:54:23.128Z

Reserved: 2025-04-10T12:29:29.427Z

Link: CVE-2025-3501

cve-icon Vulnrichment

Updated: 2025-04-30T15:54:18.202Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-29T21:15:51.523

Modified: 2025-05-02T13:53:40.163

Link: CVE-2025-3501

cve-icon Redhat

Severity : Important

Publid Date: 2025-04-29T00:00:00Z

Links: CVE-2025-3501 - Bugzilla