CVE-2025-7365
Description
A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-servicesMaven | < 26.0.13 | 26.0.13 |
org.keycloak:keycloak-servicesMaven | >= 26.2.0, < 26.2.6 | 26.2.6 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- access.redhat.com/errata/RHSA-2025:11986nvdVendor AdvisoryWEB
- access.redhat.com/errata/RHSA-2025:11987nvdVendor AdvisoryWEB
- access.redhat.com/errata/RHSA-2025:12015nvdVendor AdvisoryWEB
- access.redhat.com/errata/RHSA-2025:12016nvdVendor AdvisoryWEB
- access.redhat.com/security/cve/CVE-2025-7365nvdVendor AdvisoryWEB
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingVendor AdvisoryWEB
- github.com/advisories/GHSA-xhpr-465j-7p9qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-7365ghsaADVISORY
- github.com/keycloak/keycloak/issues/40446nvdWEB
- github.com/keycloak/keycloak/pull/40520nvdWEB
- github.com/keycloak/keycloak/releases/tag/26.0.13ghsaWEB
- github.com/keycloak/keycloak/releases/tag/26.2.6ghsaWEB
- github.com/keycloak/keycloak/releases/tag/26.3.0ghsaWEB
- github.com/keycloak/keycloak/security/advisories/GHSA-xhpr-465j-7p9qghsaWEB
News mentions
0No linked articles in our index yet.