GHSA-93vm-mqpw-8wh3: Duplicate Advisory: Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-4hx9-48xh-5mxr. This link is maintained to preserve external references.
Original Description
A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.
References
- access.redhat.com/errata/RHSA-2025:22088
- access.redhat.com/errata/RHSA-2025:22089
- access.redhat.com/errata/RHSA-2025:22090
- access.redhat.com/errata/RHSA-2025:22091
- access.redhat.com/security/cve/CVE-2025-13467
- bugzilla.redhat.com/show_bug.cgi?id=2416038
- github.com/advisories/GHSA-93vm-mqpw-8wh3
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/commit/754c070cf8ca187dcc71f0f72ff3130ff2195328
- github.com/keycloak/keycloak/issues/44478
- github.com/keycloak/keycloak/releases/tag/26.4.6
- nvd.nist.gov/vuln/detail/CVE-2025-13467
Code Behaviors & Features
Detect and mitigate GHSA-93vm-mqpw-8wh3 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →