CVE-2025-13467
BaseFortify
Publication date: 2025-11-25
Last updated on: 2025-11-25
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| keycloak | keycloak | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the Keycloak LDAP User Federation provider that allows an authenticated realm administrator to cause deserialization of untrusted Java objects by configuring a malicious LDAP server. This can lead to unsafe processing of data from the LDAP server.
How can this vulnerability impact me? :
An attacker with authenticated realm administrator privileges can exploit this vulnerability to execute unsafe deserialization, potentially leading to data integrity and confidentiality issues, such as unauthorized access or manipulation of data within the Keycloak system.