Keycloak LDAP User Federation provider enables admin-triggered untrusted Java deserialization
Moderate severity
GitHub Reviewed
Published
Dec 19, 2025
in
keycloak/keycloak
•
Updated Dec 19, 2025
Package
Affected versions
< 26.4.6
Patched versions
26.4.6
Description
Published to the GitHub Advisory Database
Dec 19, 2025
Reviewed
Dec 19, 2025
Last updated
Dec 19, 2025
A flaw was found in the Keycloak LDAP User Federation provider. This vulnerability allows an authenticated realm administrator to trigger deserialization of untrusted Java objects via a malicious LDAP server configuration.
Mitigation
Disable LDAP referrals in all LDAP user providers in all realms if projects cannot upgrade to the patched versions.
References