Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3501: Improper Validation of Certificate with Host Mismatch

0
High
VulnerabilityCVE-2025-3501cvecve-2025-3501
Published: Tue Apr 29 2025 (04/29/2025, 20:45:29 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:35:23 UTC

Technical Analysis

CVE-2025-3501 is a vulnerability identified in the Red Hat Build of Keycloak, an open-source identity and access management solution widely used for single sign-on and authentication services. The issue stems from an implementation flaw where setting the certificate verification policy to 'ALL' inadvertently disables the validation of certificates against the trust store. This means that when this policy is active, Keycloak does not properly verify whether the presented certificate's hostname matches the expected hostname, effectively bypassing a critical security check. As a result, an attacker could exploit this by presenting a certificate with a mismatched hostname, which would normally be rejected, allowing them to intercept or manipulate authentication traffic. The vulnerability affects versions 25.0.0, 26.0.0, and 26.2.0 of the product. The CVSS 3.1 base score is 8.2, indicating a high severity level, with an attack vector that is network-based, requires no privileges or user interaction, and impacts confidentiality significantly while having limited impact on integrity and no impact on availability. This flaw could facilitate man-in-the-middle attacks, undermining the trust model of TLS communications within Keycloak deployments. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a critical concern for organizations relying on Keycloak for secure authentication.

Potential Impact

The primary impact of CVE-2025-3501 is the potential compromise of confidentiality in authentication processes managed by Keycloak. By bypassing hostname verification in TLS certificates, attackers can perform man-in-the-middle attacks, intercepting or altering sensitive authentication tokens and user credentials. This could lead to unauthorized access to protected resources, data breaches, and further lateral movement within affected networks. The integrity impact is limited but still present, as attackers might manipulate authentication flows. Availability is not affected. Organizations worldwide that use Keycloak for identity management, especially in cloud environments or multi-tenant systems, face increased risk of credential theft and session hijacking. The vulnerability's ease of exploitation without authentication or user interaction increases the threat level, potentially affecting large-scale deployments and critical infrastructure relying on Keycloak for secure access control.

Mitigation Recommendations

To mitigate CVE-2025-3501, organizations should immediately review and adjust the certificate verification policy settings in their Keycloak deployments, avoiding the use of the 'ALL' verification policy that disables trust store validation. Applying patches or updates from Red Hat as soon as they become available is critical. In the interim, administrators should enforce strict TLS validation policies, including hostname verification, and consider deploying network-level protections such as TLS interception detection and anomaly monitoring. Additionally, implementing multi-factor authentication can reduce the risk of compromised credentials being exploited. Regularly auditing Keycloak configurations and monitoring authentication logs for unusual activity can help detect exploitation attempts early. Organizations should also educate their security teams about this vulnerability to ensure rapid response and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-10T12:29:29.427Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbedc4f

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 2/27/2026, 1:35:23 PM

Last updated: 3/25/2026, 4:33:44 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses