Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.keycloak/keycloak-quarkus-dist
  4. ›
  5. CVE-2025-11419

CVE-2025-11419: Keycloak TLS Client-Initiated Renegotiation Denial of Service

October 27, 2025

Keycloak is vulnerable to a Denial of Service (DoS) attack due to the default JDK setting that permits Client-Initiated Renegotiation in TLS 1.2. An unauthenticated remote attacker can repeatedly initiate TLS renegotiation requests to exhaust server CPU resources, making the service unavailable. Immediate mitigation is available by setting the -Djdk.tls.rejectClientInitiatedRenegotiation=true Java system property in the Keycloak startup configuration.

References

  • github.com/advisories/GHSA-q8hq-4h99-fj7x
  • github.com/keycloak/keycloak
  • github.com/keycloak/keycloak/security/advisories/GHSA-q8hq-4h99-fj7x
  • nvd.nist.gov/vuln/detail/CVE-2025-11419

Code Behaviors & Features

Detect and mitigate CVE-2025-11419 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 26.0.16, all versions starting from 26.1.0 before 26.2.10, all versions starting from 26.3.0 before 26.4.1

Fixed versions

  • 26.0.16
  • 26.2.10
  • 26.4.1

Solution

Upgrade to versions 26.0.16, 26.2.10, 26.4.1 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-400: Uncontrolled Resource Consumption
  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

maven/org.keycloak/keycloak-quarkus-dist/CVE-2025-11419.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 08 Nov 2025 00:20:51 +0000.