Build of keycloak Vulnerabilities

Security vulnerability tracking for Redhat Build of keycloak

Last updated: Feb 27, 2026
Total CVEs

1

Critical

0

With Exploits

2

Last 30 Days

0

Vulnerability Timeline

1 vulnerabilities discovered over time for Build of keycloak

Severity Distribution

Critical0
0%
High0
0%
Medium1
100%
Low1
100%
DescriptionVendor / ProductExploit Status
CVE-2025-121503.1

An attacker can register fake or untrusted authentication devices in Keycloak, even if the system is set to require secure verification, by submitting a specific type of data that bypasses security checks. This vulnerability weakens the overall security of user authentication, but it requires the attacker to have access to the registration process.

redhatbuild of keycloak
Exploit Available
about 1 month agoFeb 27, 2026

About Redhat Build of keycloak Security

This page provides comprehensive security vulnerability tracking for Redhat Build of keycloak. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Build of keycloak updated to the latest version
  • • Subscribe to security advisories from Redhat
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately