4.9
CVE-2025-9162
- EPSS 0.05%
- Published 21.08.2025 15:40:25
- Last modified 22.09.2025 16:15:46
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A flaw was found in org.keycloak/keycloak-model-storage-service. The KeycloakRealmImport custom resource substitutes placeholders within imported realm documents, potentially referencing environment variables. This substitution process allows for injection attacks when crafted realm documents are processed. An attacker can leverage this to inject malicious content during the realm import procedure. This can lead to unintended consequences within the Keycloak environment.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.0
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.0
Default Statusaffected
Version <
*
Version
26.0.15-1
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.0
Default Statusaffected
Version <
*
Version
26.0-18
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.0
Default Statusaffected
Version <
*
Version
26.0-19
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.2
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.2
Default Statusaffected
Version <
*
Version
26.2.8-1
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.2
Default Statusaffected
Version <
*
Version
26.2-8
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.2
Default Statusaffected
Version <
*
Version
26.2-8
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.2
Default Statusaffected
Version <
*
Version
26.2.9-1
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.2
Default Statusaffected
Version <
*
Version
26.2-9
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.2
Default Statusaffected
Version <
*
Version
26.2-9
Status
unaffected
VendorRed Hat
≫
Product
Red Hat build of Keycloak 26.2.9
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.133 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-526 Cleartext Storage of Sensitive Information in an Environment Variable
The product uses an environment variable to store unencrypted sensitive information.