Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11537: Improper Output Neutralization for Logs in Red Hat Red Hat Build of Keycloak

0
Medium
VulnerabilityCVE-2025-11537cvecve-2025-11537
Published: Tue Feb 10 2026 (02/10/2026, 10:53:28 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

CVE-2025-11537 is a medium severity vulnerability in Red Hat Build of Keycloak where verbose logging configurations can expose sensitive headers such as Authorization and Cookie in cleartext logs. An attacker with read access to these logs can extract bearer tokens or session cookies, enabling user impersonation and full account compromise. Exploitation requires low privileges and user interaction to trigger verbose logging, but no network access is needed. This vulnerability does not impact system availability or integrity directly but severely compromises confidentiality. There are no known exploits in the wild yet. European organizations using Keycloak for identity and access management should review their logging configurations and restrict log file access to mitigate risk. Countries with significant Red Hat and Keycloak deployments, especially those with critical infrastructure or government use, are most at risk.

AI-Powered Analysis

AILast updated: 02/10/2026, 11:30:40 UTC

Technical Analysis

CVE-2025-11537 is a vulnerability identified in the Red Hat Build of Keycloak, an open-source identity and access management solution widely used for single sign-on and authentication. The flaw arises when Keycloak's logging is configured to use verbose, user-supplied patterns such as the predefined 'long' pattern. Under these configurations, sensitive HTTP headers including Authorization and Cookie headers are logged in cleartext. These headers often contain bearer tokens or session cookies that serve as authentication credentials. If an attacker gains read access to these log files, they can extract these credentials and impersonate legitimate users, leading to full account compromise. The vulnerability requires the attacker to have low privileges (local access) and user interaction to enable or trigger verbose logging. The CVSS v3.1 score is 5.0 (medium severity), reflecting the moderate complexity of exploitation and the significant confidentiality impact without affecting integrity or availability. No known public exploits have been reported. The vulnerability highlights improper output neutralization in logging mechanisms, a common security oversight that can leak sensitive data through logs. Since Keycloak is often deployed in enterprise and government environments, the exposure of authentication tokens can have serious security implications if logs are not properly secured or if verbose logging is enabled in production environments.

Potential Impact

For European organizations, the impact of CVE-2025-11537 can be significant, particularly for those relying on Keycloak for identity management in critical applications. Exposure of bearer tokens and session cookies can lead to unauthorized access to user accounts, potentially allowing attackers to bypass authentication controls and access sensitive data or systems. This can result in data breaches, regulatory non-compliance (e.g., GDPR violations due to unauthorized data access), and reputational damage. The vulnerability does not directly affect system availability or integrity but compromises confidentiality, which is critical in identity management contexts. Organizations with multi-tenant environments or those handling sensitive personal or financial data are at higher risk. Additionally, if attackers gain persistent access to logs, they can maintain long-term access by harvesting tokens over time. The medium severity rating suggests that while exploitation is not trivial, the consequences of successful exploitation are serious enough to warrant prompt remediation.

Mitigation Recommendations

To mitigate CVE-2025-11537, European organizations should: 1) Immediately review and restrict logging configurations in Keycloak to avoid verbose or user-supplied patterns that log sensitive headers. Prefer minimal logging levels in production environments. 2) Implement strict access controls on log files, ensuring only authorized personnel can read logs, using file system permissions and centralized log management with role-based access control. 3) Regularly audit logs for sensitive data exposure and remove or redact sensitive information where feasible. 4) Apply the latest patches and updates from Red Hat as they become available, even though no patch links are currently provided, monitoring Red Hat advisories closely. 5) Consider implementing token expiration and rotation policies to limit the window of token misuse if leaked. 6) Educate administrators on secure logging practices and the risks of verbose logging in security-sensitive applications. 7) Employ intrusion detection or anomaly detection systems to monitor for unusual access patterns that may indicate token misuse. These steps go beyond generic advice by focusing on configuration hygiene, access control, and operational monitoring specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-10-09T01:26:22.026Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b13804b57a58fa1ff0ffd

Added to database: 2/10/2026, 11:16:16 AM

Last enriched: 2/10/2026, 11:30:40 AM

Last updated: 2/10/2026, 12:19:32 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats