Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-4hx9-48xh-5mxr: Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization

A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.

Mitigation

Disable LDAP referrals in all LDAP user providers in all realms if projects cannot upgrade to the patched versions.

ghsa
#vulnerability#git#java#intel#ldap#auth#maven

Skip to content

Navigation Menu

    • AI CODE CREATION

      • GitHub CopilotWrite better code with AI

      • GitHub SparkBuild and deploy intelligent apps

      • GitHub ModelsManage and compare prompts

      • MCP RegistryNewIntegrate external tools

View all features
  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

Appearance settings

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-13467

Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization

Moderate severity GitHub Reviewed Published Dec 19, 2025 in keycloak/keycloak • Updated Dec 19, 2025

Package

maven org.keycloak:keycloak-ldap-federation (Maven)

Affected versions

< 26.4.6

Description

Published to the GitHub Advisory Database

Dec 19, 2025

Last updated

Dec 19, 2025

Related news

GHSA-93vm-mqpw-8wh3: Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization

A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.