Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7365: Origin Validation Error

0
High
VulnerabilityCVE-2025-7365cvecve-2025-7365
Published: Thu Jul 10 2025 (07/10/2025, 14:20:45 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26

Description

A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:07:19 UTC

Technical Analysis

CVE-2025-7365 is a vulnerability identified in Red Hat's build of Keycloak version 26.2.0 and earlier, involving an origin validation error during the account merge process in identity provider (IdP) login flows. When an authenticated attacker attempts to merge their account with another existing account, they are prompted to review profile information. The flaw allows the attacker to modify their email address to that of a victim's account. This triggers a verification email sent to the victim's email address; critically, the verification email does not disclose the attacker's email address, which can deceive the victim into believing the email is legitimate. If the victim clicks the verification link, the attacker can complete the merge and gain unauthorized access to the victim's account. The vulnerability impacts confidentiality, integrity, and availability by enabling account takeover. The CVSS 3.1 score is 7.1 (high), reflecting network attack vector, low privileges required, user interaction needed, and high impact on all security properties. No public exploits are known at this time. The vulnerability arises from insufficient validation of the origin and email address during the merge process, allowing email spoofing and phishing attacks to facilitate account compromise.

Potential Impact

This vulnerability poses a significant risk to organizations using Red Hat's Keycloak 26 or earlier versions for identity and access management. Successful exploitation can lead to account takeover, compromising user confidentiality and integrity, and potentially allowing attackers to escalate privileges or access sensitive resources. The phishing nature of the attack increases the likelihood of victim interaction, making social engineering a critical factor. Organizations relying on Keycloak for single sign-on or federated identity management could see widespread impact, including unauthorized access to internal applications, data breaches, and disruption of services. The attack could also undermine user trust and lead to regulatory compliance issues if personal data is compromised. Given Keycloak's use in enterprise and government sectors, the impact could be severe, especially where identity federation is critical.

Mitigation Recommendations

Organizations should immediately audit their Keycloak deployments to identify affected versions (up to 26.2.0) and plan for prompt patching once Red Hat releases an official fix. Until patches are available, administrators should consider disabling account merge functionality or restricting it to highly trusted users. Implement enhanced monitoring and alerting on account merge and profile review activities to detect suspicious behavior. Educate users about phishing risks related to verification emails and encourage verification of email authenticity before clicking links. Employ multi-factor authentication (MFA) to reduce the risk of account takeover even if credentials are compromised. Review and tighten email verification workflows to ensure the origin and email addresses are properly validated. Additionally, consider deploying email security solutions that can detect and block phishing attempts triggered by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-07-08T18:22:15.734Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686fceada83201eaaca818f9

Added to database: 7/10/2025, 2:31:09 PM

Last enriched: 2/26/2026, 4:07:19 PM

Last updated: 3/25/2026, 4:13:42 AM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses