Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RED HAT — Vulnerabilities & Security Advisories 691

Browse all 691 CVE security advisories affecting RED HAT. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Red Hat operates primarily as a provider of open-source enterprise software solutions, most notably its Linux operating system and container platforms. With 688 recorded Common Vulnerabilities and Exposures, the organization’s historical attack surface frequently involves remote code execution, cross-site scripting, and privilege escalation flaws within its middleware and management tools. These vulnerabilities often stem from complex codebases and third-party dependencies integrated into its distribution. Security characteristics are defined by a rigorous patching lifecycle and the Red Hat Security Response Team, which issues timely advisories for critical issues. While major public breaches directly attributed to Red Hat core infrastructure are rare, individual component flaws have occasionally allowed attackers to gain unauthorized access or execute arbitrary commands. The company maintains a strong reputation for transparency, providing detailed technical guidance to help administrators mitigate risks associated with its widely deployed enterprise technologies.

CVE IDTitleCVSSSeverityPublished
CVE-2025-14559 Org.keycloak/keycloak-services: keycloak keycloak-services: business logic flaw allows unauthorized token issuance for disabled users — Red Hat build of Keycloak 26.4CWE-840 6.5 Medium2026-01-21
CVE-2026-1035 Org.keycloak.protocol.oidc: keycloak refresh token reuse bypass via toctou race condition — Red Hat build of Keycloak 26.4CWE-367 3.1 Low2026-01-21
CVE-2026-1180 Org.keycloak.protocol.oidc: blind server-side request forgery (ssrf) in keycloak oidc dynamic client registration via jwks_uri — Red Hat build of Keycloak 26.4CWE-918 5.8 Medium2026-01-20
CVE-2026-0992 Libxml2: libxml2: denial of service via crafted xml catalogs — Red Hat Hardened ImagesCWE-400 2.9 Low2026-01-15
CVE-2026-0989 Libxml2: unbounded relaxng include recursion leading to stack overflow — Red Hat Hardened ImagesCWE-674 3.7 Low2026-01-15
CVE-2026-0990 Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing — Red Hat Hardened ImagesCWE-674 5.9 Medium2026-01-15
CVE-2026-0976 Org.keycloak/keycloak-quarkus-server: keycloak: proxy bypass due to improper handling of matrix parameters in url paths — Red Hat Build of KeycloakCWE-20 3.7 Low2026-01-15
CVE-2025-14242 Vsftpd: vsftpd: denial of service via integer overflow in ls command parameter parsing — Red Hat Enterprise Linux 10CWE-190 6.5 Medium2026-01-14
CVE-2026-0716 Libsoup: out-of-bounds read in libsoup websocket frame processing — Red Hat Enterprise Linux 10CWE-805 4.8 Medium2026-01-13
CVE-2025-12548 Github.com/che-incubator/che-code: eclipse che — unauthenticated rce and secret exfiltration via tcp/3333 — Red Hat OpenShift Dev Spaces (RHOSDS) 3.22CWE-306 9.0 Critical2026-01-13
CVE-2025-14025 Ansible-automation-platform/aap-gateway: aap-gateway: read-only personal access token (pat) bypasses write restrictions — Red Hat Ansible Automation Platform 2.5 for RHEL 8CWE-279 8.5 High2026-01-08
CVE-2026-0719 Libsoup: signed to unsigned conversion error leading to stack-based buffer overflow in libsoup ntlm authentication — Red Hat Enterprise Linux 10CWE-121 8.6 High2026-01-08
CVE-2026-0707 Keycloak: keycloak authorization header parsing leading to potential security control bypass — Red Hat build of Keycloak 26.4CWE-551 5.3 Medium2026-01-08
CVE-2025-12543 Undertow-core: undertow http server fails to reject malformed host headers leading to potential cache poisoning and ssrf — Red Hat build of Apache Camel 4.14.4 for Spring Boot 3.5.11CWE-20 9.6 Critical2026-01-07
CVE-2025-14946 Libnbd: libnbd: arbitrary code execution via ssh argument injection through a malicious uri — libnbdCWE-88 4.8 Medium2025-12-19
CVE-2025-14443 Ose-openshift-apiserver: openshift api server: server-side request forgery (ssrf) vulnerability in imagestreamimport mechanism — Red Hat OpenShift Container Platform 4CWE-918 6.4 Medium2025-12-16
CVE-2025-14777 Keycloak: keycloak idor in realm client creating/deleting — Red Hat build of Keycloak 26.4CWE-289 6.0 Medium2025-12-16
CVE-2025-11393 Insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: improper proxy configuration allows unauthorized administrative commands — Red Hat Lightspeed (formerly Insights) for Runtimes 1CWE-441 8.7 High2025-12-15
CVE-2025-14523 Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins) — Red Hat Enterprise Linux 10CWE-444 8.2 High2025-12-11
CVE-2025-14082 Keycloak-services: keycloak admin rest api: improper access control leads to sensitive role metadata information disclosure — Red Hat build of Keycloak 26.4CWE-284 2.7 Low2025-12-10
CVE-2024-3884 Undertow: outofmemory when parsing form data encoding with application/x-www-form-urlencoded — Red Hat JBoss Enterprise Application PlatformCWE-20 7.5 High2025-12-03
CVE-2025-57850 Codeready-ws: privilege escalation via excessive /etc/passwd permissions — Red Hat OpenShift Dev SpacesCWE-276 6.4 Medium2025-12-02
CVE-2021-4472 Python-mistralclient: mistral-dashboard: local file inclusion through the 'create workbook' feature — Red Hat OpenStack Platform 13 (Queens)CWE-73 6.5 Medium2025-11-26
CVE-2025-12789 Rhsso: open redirect — Red Hat Single Sign-On 7CWE-601 6.1 Medium2025-11-06
CVE-2025-12103 Openshift-ai: trusty ai grants all authenticated users to list pods in any namespace — Red Hat OpenShift AI 2.25CWE-266 5.0 Medium2025-10-28
CVE-2025-57848 Container-native-virtualization: privilege escalation via excessive /etc/passwd permissions — Red Hat OpenShift Virtualization 4CWE-276 6.4 Medium2025-10-23
CVE-2025-6242 Vllm: server side request forgery (ssrf) in mediaconnector — Red Hat AI Inference ServerCWE-918 7.1 High2025-10-07
CVE-2025-7493 Freeipa: idm: privilege escalation from host to domain admin in freeipa — Red Hat Enterprise Linux 10CWE-1220 9.1 Critical2025-09-30
CVE-2025-57852 Openshift-ai: privilege escalation via excessive /etc/passwd permissions — Red Hat OpenShift AI 2.16CWE-276 6.4 Medium2025-09-30
CVE-2025-5962 Rhel-lightspeed: improper access control in lightspeed history management allows local privilege manipulation — Red Hat Enterprise Linux 10CWE-284 7.7 High2025-09-22

This page lists every published CVE security advisory associated with RED HAT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.