Uploaded image for project: 'Red Hat build of Keycloak'
  1. Red Hat build of Keycloak
  2. RHBK-3246

CVE-2025-8419 org.keycloak/keycloak-services: Keycloak SMTP Inject Vulnerability [rhbk-26.2]

XMLWordPrintable

    • False
    • Hide

      None

      Show
      None
    • False
    • Researcher
    • CVE-2025-8419
    • 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
    • CWE-93
    • org.keycloak/keycloak-services
    • org.keycloak/keycloak-services
    • False
    • Moderate

      Security Tracking Issue

      Do not make this issue public.

      Flaw:


      Keycloak SMTP Inject Vulnerability

      Email injection that can send a spam message (very short) to an email
      eddress.

      1. Using for example the email registration the attacker uses a crafted
      email address with UTF-8 characters like:
      甲申申甶甴甸电甹甸甸畀畱畱瘮畣畯畭甾瘍瘊畄畁畔畁瘍瘊畓畵畢番略畣畴町畐畗畎畅畄瘍瘊瘍瘊畈畡畣畫瘡瘍瘊瘮瘍瘊畑畕畉畔瘍瘊@q.a
      2. The special chars in UTF-8 have in lower byte the value:
      2336485988@qq.com>\r\nDATA\r\nSubject:PWNED\r\n\r\nHack!\r\n.\r\nQUIT\r\n
      3. This creates the email injection that sends the email to the address
      2336485988@qq.com

      ~~~

      The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT.
      https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams

      Tracker accuracy feedback form: https://docs.google.com/forms/d/e/1FAIpQLSfa6zTaEGohRdiIqGVAvWTSAL0kpO_DkkEICuIHzQHFwmKswg/viewform

              rhn-support-rmartinc Ricardo Martin Camarero
              rhn-support-pdelbell Patrick Del Bello
              Alexander Schwartz, Bruno Oliveira da Silva, Jon Koops, Marek Posolda, Paramvir Jindal, Ricardo Martin Camarero, Stan Silvert, Stian Thorgersen, Václav Muzikář
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: