Search for vulnerabilities
Vulnerability details: VCID-w71m-tyt8-dqby
Vulnerability ID VCID-w71m-tyt8-dqby
Aliases CVE-2025-3501
GHSA-hw58-3793-42gg
Summary A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 8.2 https://access.redhat.com/errata/RHSA-2025:4335
generic_textual HIGH https://access.redhat.com/errata/RHSA-2025:4335
ssvc Track https://access.redhat.com/errata/RHSA-2025:4335
cvssv3.1 8.2 https://access.redhat.com/errata/RHSA-2025:4336
generic_textual HIGH https://access.redhat.com/errata/RHSA-2025:4336
ssvc Track https://access.redhat.com/errata/RHSA-2025:4336
cvssv3.1 8.2 https://access.redhat.com/errata/RHSA-2025:8672
ssvc Track https://access.redhat.com/errata/RHSA-2025:8672
cvssv3.1 8.2 https://access.redhat.com/errata/RHSA-2025:8690
ssvc Track https://access.redhat.com/errata/RHSA-2025:8690
cvssv3 8.2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3501.json
cvssv3.1 8.2 https://access.redhat.com/security/cve/CVE-2025-3501
generic_textual HIGH https://access.redhat.com/security/cve/CVE-2025-3501
ssvc Track https://access.redhat.com/security/cve/CVE-2025-3501
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
epss 0.00028 https://api.first.org/data/v1/epss?cve=CVE-2025-3501
cvssv3.1 8.2 https://bugzilla.redhat.com/show_bug.cgi?id=2358834
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=2358834
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2358834
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-hw58-3793-42gg
cvssv3.1 8.2 https://github.com/keycloak/keycloak
generic_textual HIGH https://github.com/keycloak/keycloak
cvssv3.1 8.2 https://github.com/keycloak/keycloak/commit/99ca24c832729075e04d8bc58666089268314272
generic_textual HIGH https://github.com/keycloak/keycloak/commit/99ca24c832729075e04d8bc58666089268314272
cvssv3.1 8.2 https://github.com/keycloak/keycloak/security/advisories/GHSA-hw58-3793-42gg
cvssv3.1_qr HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-hw58-3793-42gg
generic_textual HIGH https://github.com/keycloak/keycloak/security/advisories/GHSA-hw58-3793-42gg
cvssv3.1 8.2 https://nvd.nist.gov/vuln/detail/CVE-2025-3501
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2025-3501
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2025:4335
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-30T15:54:12Z/ Found at https://access.redhat.com/errata/RHSA-2025:4335
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2025:4336
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-30T15:54:12Z/ Found at https://access.redhat.com/errata/RHSA-2025:4336
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2025:8672
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-30T15:54:12Z/ Found at https://access.redhat.com/errata/RHSA-2025:8672
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/errata/RHSA-2025:8690
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-30T15:54:12Z/ Found at https://access.redhat.com/errata/RHSA-2025:8690
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3501.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://access.redhat.com/security/cve/CVE-2025-3501
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-30T15:54:12Z/ Found at https://access.redhat.com/security/cve/CVE-2025-3501
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2358834
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-30T15:54:12Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2358834
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://github.com/keycloak/keycloak
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://github.com/keycloak/keycloak/commit/99ca24c832729075e04d8bc58666089268314272
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://github.com/keycloak/keycloak/security/advisories/GHSA-hw58-3793-42gg
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2025-3501
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.0259
EPSS Score 0.00017
Published At April 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-04-30T07:36:00.550343+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2025-3501 36.0.0