Headline
GHSA-4hx9-48xh-5mxr: Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization
A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.
Mitigation
Disable LDAP referrals in all LDAP user providers in all realms if projects cannot upgrade to the patched versions.
Skip to content
Navigation Menu
AI CODE CREATION
GitHub CopilotWrite better code with AI
GitHub SparkBuild and deploy intelligent apps
GitHub ModelsManage and compare prompts
MCP RegistryNewIntegrate external tools
View all features
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
Appearance settings
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-13467
Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization
Moderate severity GitHub Reviewed Published Dec 19, 2025 in keycloak/keycloak • Updated Dec 19, 2025
Package
maven org.keycloak:keycloak-ldap-federation (Maven)
Affected versions
< 26.4.6
Description
Published to the GitHub Advisory Database
Dec 19, 2025
Last updated
Dec 19, 2025
Related news
A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.