CVE-2025-11537: Improper Output Neutralization for Logs in Red Hat Red Hat Build of Keycloak
A flaw was found in Keycloak. When the logging format is configured to a verbose, user-supplied pattern (such as the pre-defined 'long' pattern), sensitive headers including Authorization and Cookie are disclosed to the logs in cleartext. An attacker with read access to the log files can extract these credentials (e.g., bearer tokens, session cookies) and use them to impersonate users, leading to a full account compromise.
AI Analysis
Technical Summary
CVE-2025-11537 identifies a security vulnerability in the Red Hat Build of Keycloak, an open-source identity and access management solution. The flaw arises when the logging format is configured to a verbose, user-supplied pattern such as the predefined 'long' pattern. Under these configurations, sensitive HTTP headers including Authorization and Cookie are logged in cleartext within application logs. These headers often contain bearer tokens or session cookies that serve as authentication credentials. If an attacker gains read access to these logs, they can extract these credentials and use them to impersonate legitimate users, potentially leading to full account compromise. The vulnerability requires that the attacker has some level of local or limited privileges to access the log files, as well as user interaction to enable or trigger verbose logging. The CVSS 3.1 score of 5.0 reflects a medium severity, considering the attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). The impact on confidentiality is high (C:H), but integrity and availability are not affected (I:N, A:N). There are no known exploits in the wild at the time of publication, and no patches or mitigation links are provided in the source data. This vulnerability highlights the risk of improper output neutralization in logging mechanisms, emphasizing the need to avoid logging sensitive authentication data in verbose logs.
Potential Impact
The primary impact of this vulnerability is the potential disclosure of sensitive authentication credentials through application logs. If an attacker can read the logs, they can extract bearer tokens or session cookies and impersonate users, leading to unauthorized access and full account compromise. This can result in unauthorized data access, privilege escalation, and potential lateral movement within an organization's network. Although the vulnerability does not affect system availability or integrity directly, the confidentiality breach can have severe consequences including data breaches, regulatory non-compliance, and reputational damage. Organizations relying on Keycloak for identity management and authentication are at risk, especially if log files are not adequately protected or if verbose logging is enabled in production environments. The requirement for local or limited privileges to access logs somewhat limits the attack scope, but insider threats or attackers who have gained initial footholds could exploit this vulnerability to escalate access.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and adjust their logging configurations to avoid using verbose or user-supplied patterns that log sensitive headers such as Authorization and Cookie. Specifically, disable or modify the 'long' logging pattern or any custom patterns that include sensitive data. Access controls on log files must be strictly enforced to ensure that only authorized personnel can read them, employing least privilege principles. Implement log monitoring and alerting to detect unusual access patterns or attempts to read logs. Consider encrypting log files at rest and in transit to reduce the risk of unauthorized disclosure. Regularly audit logging configurations and access permissions as part of security hygiene. If possible, update to a patched version of Keycloak once available from Red Hat. Additionally, educate administrators and developers about the risks of logging sensitive information and incorporate secure logging practices into development and deployment workflows.
Affected Countries
United States, Germany, United Kingdom, France, India, Japan, Canada, Australia, Brazil, South Korea
CVE-2025-11537: Improper Output Neutralization for Logs in Red Hat Red Hat Build of Keycloak
Description
A flaw was found in Keycloak. When the logging format is configured to a verbose, user-supplied pattern (such as the pre-defined 'long' pattern), sensitive headers including Authorization and Cookie are disclosed to the logs in cleartext. An attacker with read access to the log files can extract these credentials (e.g., bearer tokens, session cookies) and use them to impersonate users, leading to a full account compromise.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11537 identifies a security vulnerability in the Red Hat Build of Keycloak, an open-source identity and access management solution. The flaw arises when the logging format is configured to a verbose, user-supplied pattern such as the predefined 'long' pattern. Under these configurations, sensitive HTTP headers including Authorization and Cookie are logged in cleartext within application logs. These headers often contain bearer tokens or session cookies that serve as authentication credentials. If an attacker gains read access to these logs, they can extract these credentials and use them to impersonate legitimate users, potentially leading to full account compromise. The vulnerability requires that the attacker has some level of local or limited privileges to access the log files, as well as user interaction to enable or trigger verbose logging. The CVSS 3.1 score of 5.0 reflects a medium severity, considering the attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). The impact on confidentiality is high (C:H), but integrity and availability are not affected (I:N, A:N). There are no known exploits in the wild at the time of publication, and no patches or mitigation links are provided in the source data. This vulnerability highlights the risk of improper output neutralization in logging mechanisms, emphasizing the need to avoid logging sensitive authentication data in verbose logs.
Potential Impact
The primary impact of this vulnerability is the potential disclosure of sensitive authentication credentials through application logs. If an attacker can read the logs, they can extract bearer tokens or session cookies and impersonate users, leading to unauthorized access and full account compromise. This can result in unauthorized data access, privilege escalation, and potential lateral movement within an organization's network. Although the vulnerability does not affect system availability or integrity directly, the confidentiality breach can have severe consequences including data breaches, regulatory non-compliance, and reputational damage. Organizations relying on Keycloak for identity management and authentication are at risk, especially if log files are not adequately protected or if verbose logging is enabled in production environments. The requirement for local or limited privileges to access logs somewhat limits the attack scope, but insider threats or attackers who have gained initial footholds could exploit this vulnerability to escalate access.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and adjust their logging configurations to avoid using verbose or user-supplied patterns that log sensitive headers such as Authorization and Cookie. Specifically, disable or modify the 'long' logging pattern or any custom patterns that include sensitive data. Access controls on log files must be strictly enforced to ensure that only authorized personnel can read them, employing least privilege principles. Implement log monitoring and alerting to detect unusual access patterns or attempts to read logs. Consider encrypting log files at rest and in transit to reduce the risk of unauthorized disclosure. Regularly audit logging configurations and access permissions as part of security hygiene. If possible, update to a patched version of Keycloak once available from Red Hat. Additionally, educate administrators and developers about the risks of logging sensitive information and incorporate secure logging practices into development and deployment workflows.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2025-10-09T01:26:22.026Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698b13804b57a58fa1ff0ffd
Added to database: 2/10/2026, 11:16:16 AM
Last enriched: 2/27/2026, 7:07:53 PM
Last updated: 3/27/2026, 8:49:37 AM
Views: 122
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.