1
0
2
0
Vulnerability Timeline
1 vulnerabilities discovered over time for Build of keycloak
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-12150 | 3.1 | An attacker can register fake or untrusted authentication devices in Keycloak, even if the system is set to require secure verification, by submitting a specific type of data that bypasses security checks. This vulnerability weakens the overall security of user authentication, but it requires the attacker to have access to the registration process. | redhatbuild of keycloak | Exploit Available | about 1 month agoFeb 27, 2026 |
About Redhat Build of keycloak Security
This page provides comprehensive security vulnerability tracking for Redhat Build of keycloak. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Build of keycloak updated to the latest version
- • Subscribe to security advisories from Redhat
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately