CVE-2025-12150
February 27, 2026
A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.
Affected Packages
https://github.com/keycloak/keycloak.git (GITHUB):
Affected version(s) >=26.4.0 <26.4.4Fix Suggestion:
Update to version 26.4.4org.keycloak:keycloak-services (JAVA):
Affected version(s) >=1.0-alpha-1 <26.4.4Fix Suggestion:
Update to version 26.4.4Related Resources (11)
Do you need more information?
Contact UsCVSS v4
Base Score:
2.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Verification of Cryptographic Signature
EPSS
Base Score:
0.03