Vulnerability Description
A vulnerability was found in Keycloak-services. Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 characters (limited local part of the email), so the attack is limited to very shorts emails (subject and little data, the example is 60 chars). This flaw's only direct consequence is an unsolicited email being sent from the Keycloak server. However, this action could be a precursor for more sophisticated attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Keycloak | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2025:15336
- https://access.redhat.com/errata/RHSA-2025:15337
- https://access.redhat.com/errata/RHSA-2025:15338
- https://access.redhat.com/errata/RHSA-2025:15339
- https://access.redhat.com/security/cve/CVE-2025-8419Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2385776Issue TrackingVendor Advisory
FAQ
What is CVE-2025-8419?
CVE-2025-8419 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability was found in Keycloak-services. Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 c...
How severe is CVE-2025-8419?
CVE-2025-8419 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-8419?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Keycloak.