CVE-2025-8419
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-06

Last updated on: 2025-09-04

Assigner: Red Hat, Inc.

Description
A vulnerability was found in Keycloak-services. Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 characters (limited local part of the email), so the attack is limited to very shorts emails (subject and little data, the example is 60 chars). This flaw's only direct consequence is an unsolicited email being sent from the Keycloak server. However, this action could be a precursor for more sophisticated attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-06
Last Modified
2025-09-04
Generated
2026-05-07
AI Q&A
2025-08-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
redhat keycloak *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-93 The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Keycloak-services involves the use of special characters during e-mail registration that can cause SMTP Injection. This means that very short, unexpected, and unwanted emails may be sent from the Keycloak server due to the injection. The email length is limited to 64 characters, restricting the attack to short emails with minimal content. The direct consequence is the sending of unsolicited emails, but this could potentially lead to more complex attacks.


How can this vulnerability impact me? :

The vulnerability can cause your Keycloak server to send unsolicited short emails unexpectedly. While the immediate impact is limited to sending unwanted emails, this behavior could be exploited as a stepping stone for more sophisticated attacks, potentially compromising your system's security or reputation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart