CVE-2025-7365: Origin Validation Error
A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.
AI Analysis
Technical Summary
CVE-2025-7365 is a vulnerability identified in Red Hat's build of Keycloak version 26.2.0 and earlier, involving an origin validation error during the account merge process in identity provider (IdP) login flows. When an authenticated attacker attempts to merge their account with another existing account, they are prompted to review profile information. The attacker can exploit this step to modify their email address to that of a victim’s account. This action triggers a verification email sent to the victim’s email address. Critically, the verification email does not disclose the attacker’s email address, which can mislead the victim into believing the email is legitimate and related to their own account activity. If the victim clicks the verification link, the attacker gains unauthorized access to the victim’s account, effectively bypassing normal authentication controls. The vulnerability has a CVSS 3.1 base score of 5.4, reflecting medium severity, with attack vector as network, requiring low privileges but user interaction, and high attack complexity. The impact primarily affects confidentiality by enabling account takeover, with limited integrity impact and no availability impact. No public exploits have been reported yet, but the phishing vector increases the risk of social engineering attacks. This vulnerability highlights a weakness in how Keycloak validates origin and handles email verification during account merges, potentially allowing attackers to impersonate victims and escalate privileges within affected systems.
Potential Impact
For European organizations, the primary impact of CVE-2025-7365 is the risk of unauthorized account takeover through social engineering and phishing. Compromised accounts can lead to data breaches, unauthorized access to sensitive information, and potential lateral movement within corporate networks. Organizations relying on Keycloak for identity and access management, especially those integrating multiple identity providers and enabling account merges, face increased risk. The phishing aspect may also erode user trust and increase the likelihood of successful spear-phishing campaigns targeting employees. Confidentiality is most at risk, as attackers can gain access to victim accounts without alerting the victim to the attacker’s identity. The medium severity rating suggests that while the vulnerability is not trivially exploitable, the combination of authentication and user interaction requirements means targeted attacks could succeed. This is particularly concerning for sectors with high-value targets such as finance, government, and critical infrastructure in Europe. Additionally, the lack of known exploits in the wild provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Apply patches or updates from Red Hat as soon as they become available to address this vulnerability in Keycloak. 2. Until patches are available, restrict or disable account merge functionality where possible, especially for users with lower privilege levels. 3. Implement strict email verification policies and monitor verification email templates to ensure they include clear sender information and warnings about unsolicited verification requests. 4. Educate users to recognize suspicious verification emails, emphasizing that verification requests should be verified through separate communication channels before clicking links. 5. Enhance monitoring and alerting for unusual account merge activities and verification email triggers within Keycloak logs. 6. Consider implementing multi-factor authentication (MFA) on account merges or profile changes to add an additional layer of security. 7. Review and tighten identity provider integration configurations to minimize attack surface related to account merges. 8. Conduct regular security audits and penetration testing focused on identity management workflows to detect similar logic flaws.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-7365: Origin Validation Error
Description
A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.
AI-Powered Analysis
Technical Analysis
CVE-2025-7365 is a vulnerability identified in Red Hat's build of Keycloak version 26.2.0 and earlier, involving an origin validation error during the account merge process in identity provider (IdP) login flows. When an authenticated attacker attempts to merge their account with another existing account, they are prompted to review profile information. The attacker can exploit this step to modify their email address to that of a victim’s account. This action triggers a verification email sent to the victim’s email address. Critically, the verification email does not disclose the attacker’s email address, which can mislead the victim into believing the email is legitimate and related to their own account activity. If the victim clicks the verification link, the attacker gains unauthorized access to the victim’s account, effectively bypassing normal authentication controls. The vulnerability has a CVSS 3.1 base score of 5.4, reflecting medium severity, with attack vector as network, requiring low privileges but user interaction, and high attack complexity. The impact primarily affects confidentiality by enabling account takeover, with limited integrity impact and no availability impact. No public exploits have been reported yet, but the phishing vector increases the risk of social engineering attacks. This vulnerability highlights a weakness in how Keycloak validates origin and handles email verification during account merges, potentially allowing attackers to impersonate victims and escalate privileges within affected systems.
Potential Impact
For European organizations, the primary impact of CVE-2025-7365 is the risk of unauthorized account takeover through social engineering and phishing. Compromised accounts can lead to data breaches, unauthorized access to sensitive information, and potential lateral movement within corporate networks. Organizations relying on Keycloak for identity and access management, especially those integrating multiple identity providers and enabling account merges, face increased risk. The phishing aspect may also erode user trust and increase the likelihood of successful spear-phishing campaigns targeting employees. Confidentiality is most at risk, as attackers can gain access to victim accounts without alerting the victim to the attacker’s identity. The medium severity rating suggests that while the vulnerability is not trivially exploitable, the combination of authentication and user interaction requirements means targeted attacks could succeed. This is particularly concerning for sectors with high-value targets such as finance, government, and critical infrastructure in Europe. Additionally, the lack of known exploits in the wild provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Apply patches or updates from Red Hat as soon as they become available to address this vulnerability in Keycloak. 2. Until patches are available, restrict or disable account merge functionality where possible, especially for users with lower privilege levels. 3. Implement strict email verification policies and monitor verification email templates to ensure they include clear sender information and warnings about unsolicited verification requests. 4. Educate users to recognize suspicious verification emails, emphasizing that verification requests should be verified through separate communication channels before clicking links. 5. Enhance monitoring and alerting for unusual account merge activities and verification email triggers within Keycloak logs. 6. Consider implementing multi-factor authentication (MFA) on account merges or profile changes to add an additional layer of security. 7. Review and tighten identity provider integration configurations to minimize attack surface related to account merges. 8. Conduct regular security audits and penetration testing focused on identity management workflows to detect similar logic flaws.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-07-08T18:22:15.734Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686fceada83201eaaca818f9
Added to database: 7/10/2025, 2:31:09 PM
Last enriched: 11/7/2025, 7:34:21 PM
Last updated: 11/21/2025, 3:46:14 PM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring
MediumCVE-2025-13357: CWE-1188: Initialization of a Resource with an Insecure Default in HashiCorp Tooling
HighCVE-2025-41115: Vulnerability in Grafana Grafana Enterprise
CriticalCVE-2025-13432: CWE-863: Incorrect Authorization in HashiCorp Terraform Enterprise
MediumCVE-2025-11127: CWE-639 Authorization Bypass Through User-Controlled Key in Mstoreapp Mobile App
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.