Authentication Bypass Due to Missing LDAP Bind After Password Reset in Keycloak
Moderate severity
GitHub Reviewed
Published
Mar 10, 2025
in
keycloak/keycloak
•
Updated Mar 10, 2025
Package
Affected versions
>= 26.1.0, < 26.1.3
< 26.0.10
Patched versions
26.1.3
26.0.10
Description
Published to the GitHub Advisory Database
Mar 10, 2025
Reviewed
Mar 10, 2025
Last updated
Mar 10, 2025
The issue arises because Keycloak does not perform an LDAP bind after a password reset, leading to potential authentication bypass for expired or disabled AD accounts. A fix should enforce LDAP validation after password updates to ensure consistency with AD authentication policies.
References