CVE-2025-0604: Authentication Bypass Due to Missing LDAP Bind After Password Reset in Keycloak
The issue arises because Keycloak does not perform an LDAP bind after a password reset, leading to potential authentication bypass for expired or disabled AD accounts. A fix should enforce LDAP validation after password updates to ensure consistency with AD authentication policies.
References
- access.redhat.com/errata/RHSA-2025:2545
- access.redhat.com/security/cve/CVE-2025-0604
- bugzilla.redhat.com/show_bug.cgi?id=2338993
- github.com/advisories/GHSA-2p82-5wwr-43cw
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/security/advisories/GHSA-2p82-5wwr-43cw
- nvd.nist.gov/vuln/detail/CVE-2025-0604
Detect and mitigate CVE-2025-0604 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →