CVE-2025-12150 PUBLISHED

Org.keycloak/keycloak-services: webauthn attestation statement verification bypass

Assigner: redhat
Reserved: 24.10.2025 Published: 27.02.2026 Updated: 27.02.2026

A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS Score: 3.1

Product Status

Vendor Keycloak
Product keycloak
Versions Default: unaffected
  • affected from 0 to 26.4.4 (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.2
Versions Default: affected
  • unaffected from 26.2.11-1 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.2
Versions Default: affected
  • unaffected from 26.2-12 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.2
Versions Default: affected
  • unaffected from 26.2-12 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.2.11
Versions Default: unaffected
Vendor Red Hat
Product Red Hat build of Keycloak 26.4
Versions Default: affected
  • unaffected from 26.4.4-1 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.4
Versions Default: affected
  • unaffected from 26.4-3 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.4
Versions Default: affected
  • unaffected from 26.4-3 to * (excl.)
Vendor Red Hat
Product Red Hat build of Keycloak 26.4.4
Versions Default: unaffected

Workarounds

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Credits

  • Red Hat would like to thank Stefan Kunz (cnlab) for reporting this issue.

References

Problem Types

  • Improper Verification of Cryptographic Signature CWE