A vulnerability was found in Keycloak-services. Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 characters (limited local part of the email), so the attack is limited to very shorts emails (subject and little data, the example is 60 chars). This flaw's only direct consequence is an unsolicited email being sent from the Keycloak server. However, this action could be a precursor for more sophisticated attacks.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2025-8419 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2385776 | Issue Tracking Vendor Advisory |
Configurations
History
13 Aug 2025, 18:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat keycloak
Redhat |
|
References | () https://access.redhat.com/security/cve/CVE-2025-8419 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2385776 - Issue Tracking, Vendor Advisory | |
CPE | cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:* | |
Summary |
|
06 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-06 17:15
Updated : 2025-08-13 18:21
NVD link : CVE-2025-8419
Mitre link : CVE-2025-8419
CVE.ORG link : CVE-2025-8419
JSON object : View
Products Affected
redhat
- keycloak
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')