Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11537: Improper Output Neutralization for Logs in Red Hat Red Hat Build of Keycloak

0
Medium
VulnerabilityCVE-2025-11537cvecve-2025-11537
Published: Tue Feb 10 2026 (02/10/2026, 10:53:28 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

A flaw was found in Keycloak. When the logging format is configured to a verbose, user-supplied pattern (such as the pre-defined 'long' pattern), sensitive headers including Authorization and Cookie are disclosed to the logs in cleartext. An attacker with read access to the log files can extract these credentials (e.g., bearer tokens, session cookies) and use them to impersonate users, leading to a full account compromise.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:07:53 UTC

Technical Analysis

CVE-2025-11537 identifies a security vulnerability in the Red Hat Build of Keycloak, an open-source identity and access management solution. The flaw arises when the logging format is configured to a verbose, user-supplied pattern such as the predefined 'long' pattern. Under these configurations, sensitive HTTP headers including Authorization and Cookie are logged in cleartext within application logs. These headers often contain bearer tokens or session cookies that serve as authentication credentials. If an attacker gains read access to these logs, they can extract these credentials and use them to impersonate legitimate users, potentially leading to full account compromise. The vulnerability requires that the attacker has some level of local or limited privileges to access the log files, as well as user interaction to enable or trigger verbose logging. The CVSS 3.1 score of 5.0 reflects a medium severity, considering the attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). The impact on confidentiality is high (C:H), but integrity and availability are not affected (I:N, A:N). There are no known exploits in the wild at the time of publication, and no patches or mitigation links are provided in the source data. This vulnerability highlights the risk of improper output neutralization in logging mechanisms, emphasizing the need to avoid logging sensitive authentication data in verbose logs.

Potential Impact

The primary impact of this vulnerability is the potential disclosure of sensitive authentication credentials through application logs. If an attacker can read the logs, they can extract bearer tokens or session cookies and impersonate users, leading to unauthorized access and full account compromise. This can result in unauthorized data access, privilege escalation, and potential lateral movement within an organization's network. Although the vulnerability does not affect system availability or integrity directly, the confidentiality breach can have severe consequences including data breaches, regulatory non-compliance, and reputational damage. Organizations relying on Keycloak for identity management and authentication are at risk, especially if log files are not adequately protected or if verbose logging is enabled in production environments. The requirement for local or limited privileges to access logs somewhat limits the attack scope, but insider threats or attackers who have gained initial footholds could exploit this vulnerability to escalate access.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and adjust their logging configurations to avoid using verbose or user-supplied patterns that log sensitive headers such as Authorization and Cookie. Specifically, disable or modify the 'long' logging pattern or any custom patterns that include sensitive data. Access controls on log files must be strictly enforced to ensure that only authorized personnel can read them, employing least privilege principles. Implement log monitoring and alerting to detect unusual access patterns or attempts to read logs. Consider encrypting log files at rest and in transit to reduce the risk of unauthorized disclosure. Regularly audit logging configurations and access permissions as part of security hygiene. If possible, update to a patched version of Keycloak once available from Red Hat. Additionally, educate administrators and developers about the risks of logging sensitive information and incorporate secure logging practices into development and deployment workflows.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-10-09T01:26:22.026Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b13804b57a58fa1ff0ffd

Added to database: 2/10/2026, 11:16:16 AM

Last enriched: 2/27/2026, 7:07:53 PM

Last updated: 3/27/2026, 8:49:37 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses