CVE-2025-12150: Keycloak REST Services has a WebAuthn Attestation Statement Verification Bypass
(updated )
A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: “none”, even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.
References
- access.redhat.com/errata/RHSA-2025:21370
- access.redhat.com/errata/RHSA-2025:21371
- access.redhat.com/errata/RHSA-2025:22088
- access.redhat.com/errata/RHSA-2025:22089
- access.redhat.com/security/cve/CVE-2025-12150
- bugzilla.redhat.com/show_bug.cgi?id=2406192
- github.com/advisories/GHSA-7g5x-9c4v-4w5r
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/commit/4136a677e7e24f6685ed25567e191e1003200339
- github.com/keycloak/keycloak/issues/35110
- github.com/keycloak/keycloak/issues/43723
- nvd.nist.gov/vuln/detail/CVE-2025-12150
Code Behaviors & Features
Detect and mitigate CVE-2025-12150 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →