Intel

AIKIDO-2025-10335

@keycloak/keycloak-admin-client is vulnerable to Improper Authentication

Improper Authentication Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

20

Low Risk

This Affects:

JS@keycloak/keycloak-admin-client
12.0.0 - 26.2.4
Fixed in 26.2.5

TL;DR

Affected versions of this package are vulnerable to Credential Harvesting via Misconfigured Host/Port Settings, where an attacker with manage-realm permissions can exploit the email server configuration by modifying the host/port to point to a malicious server without needing to re-enter the existing credentials. The attacker can then harvest the stored credentials either by using the test connection feature or by triggering an email-sending workflow (e.g., password reset), causing Keycloak to authenticate with the attacker-controlled server and exposing the credentials.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

@keycloak/keycloak-admin-client is vulnerable to Improper Authentication in versions 12.0.0 - 26.2.4.

How to fix this

Upgrade the @keycloak/keycloak-admin-client library to the patch version.