Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat build of Keycloak 26.4

0
Low
VulnerabilityCVE-2025-10939cvecve-2025-10939
Published: Tue Oct 28 2025 (10/28/2025, 03:08:30 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.4

Description

CVE-2025-10939 is a low-severity vulnerability in the Red Hat build of Keycloak 26. 4 involving an uncontrolled search path element. The issue arises when a proxy, such as HAProxy, is used and relative or non-normalized paths can be exploited to access the /admin path, which is recommended to be blocked from external exposure. This flaw could allow unauthorized users to reach administrative interfaces indirectly via the /realms path, potentially bypassing intended access restrictions. The vulnerability does not require authentication or user interaction but has a low impact limited to confidentiality with no integrity or availability effects. No known exploits are currently reported in the wild. European organizations using Keycloak behind proxies should review their proxy configurations to ensure strict path normalization and access controls. Countries with significant Red Hat and Keycloak adoption, especially those with critical identity management infrastructures, are more likely to be affected. Given the low CVSS score (3. 7) and the nature of the flaw, the overall risk is low but warrants attention to prevent potential reconnaissance or limited information disclosure.

AI-Powered Analysis

AILast updated: 12/19/2025, 20:49:49 UTC

Technical Analysis

CVE-2025-10939 identifies a vulnerability in the Red Hat build of Keycloak version 26.4 related to an uncontrolled search path element when deployed behind certain proxies, notably HAProxy. Keycloak's official guidance advises against exposing the /admin path externally when using a proxy to prevent unauthorized access. However, this vulnerability allows an attacker to exploit relative or non-normalized URL paths to circumvent these restrictions. Specifically, HAProxy can be tricked into resolving paths relative to /realms, which is typically exposed, thereby enabling indirect access to the /admin interface. This flaw stems from insufficient path normalization and validation in the proxy configuration or Keycloak's handling of proxied requests. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The impact is limited to confidentiality, as unauthorized access to the admin path could reveal sensitive administrative interfaces or information, but it does not allow modification or disruption of services. The CVSS v3.1 score is 3.7 (low), reflecting the limited impact and the requirement for a complex attack vector involving proxy misconfiguration. No patches or known exploits are currently documented, but the issue highlights the importance of secure proxy setups and strict path normalization to prevent unauthorized access to administrative endpoints in identity management systems like Keycloak.

Potential Impact

For European organizations, the primary impact of CVE-2025-10939 lies in potential unauthorized access to administrative interfaces of Keycloak deployments, which could lead to information disclosure about the identity management system's configuration or administrative functions. While the vulnerability does not directly allow modification or denial of service, exposure of the /admin path could facilitate further reconnaissance or targeted attacks against identity infrastructure. Organizations relying on Keycloak for authentication and authorization services may face increased risk if proxy configurations are not hardened, potentially compromising the confidentiality of sensitive identity management data. The impact is more pronounced in sectors with stringent identity and access management requirements, such as finance, healthcare, and government institutions. However, given the low severity and absence of known exploits, the immediate risk is limited but should not be ignored. Failure to address this vulnerability could undermine trust in identity services and complicate compliance with data protection regulations like GDPR if sensitive administrative information is leaked.

Mitigation Recommendations

To mitigate CVE-2025-10939, European organizations should implement the following specific measures: 1) Review and harden proxy configurations, especially HAProxy, to enforce strict path normalization and reject relative or non-normalized URL paths that could be exploited to access restricted endpoints. 2) Explicitly block external access to the /admin path on proxies and firewalls, ensuring it is only accessible from trusted internal networks. 3) Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious path traversal or manipulation attempts targeting Keycloak endpoints. 4) Monitor access logs for unusual requests attempting to access /admin via indirect paths and investigate anomalies promptly. 5) Keep Keycloak and proxy software up to date with the latest security patches and advisories from Red Hat and proxy vendors. 6) Conduct regular security assessments and penetration tests focusing on proxy configurations and identity management interfaces to detect similar path-related vulnerabilities. 7) Educate system administrators on secure proxy deployment best practices and the importance of adhering to Keycloak's security guidelines regarding path exposure. These targeted actions go beyond generic advice by focusing on proxy path handling and access control specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-09-25T03:17:59.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69003706ba6dffc5e2309f16

Added to database: 10/28/2025, 3:22:46 AM

Last enriched: 12/19/2025, 8:49:49 PM

Last updated: 2/8/2026, 3:53:26 AM

Views: 497

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats