← Back to CVEs
CVE-2025-11537
MEDIUM5.0
Description
A flaw was found in Keycloak. When the logging format is configured to a verbose, user-supplied pattern (such as the pre-defined 'long' pattern), sensitive headers including Authorization and Cookie are disclosed to the logs in cleartext. An attacker with read access to the log files can extract these credentials (e.g., bearer tokens, session cookies) and use them to impersonate users, leading to a full account compromise.
CVE Details
CVSS v3.1 Score5.0
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published2/10/2026
Last Modified2/10/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-117
References
https://access.redhat.com/security/cve/CVE-2025-11537(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2402616(secalert@redhat.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.