Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat build of Keycloak 26.4

0
Low
VulnerabilityCVE-2025-10939cvecve-2025-10939
Published: Tue Oct 28 2025 (10/28/2025, 03:08:30 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.4

Description

A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed.

AI-Powered Analysis

AILast updated: 11/14/2025, 02:42:24 UTC

Technical Analysis

CVE-2025-10939 identifies a vulnerability in the Red Hat build of Keycloak version 26.4 related to an uncontrolled search path element. Keycloak's official guidance recommends not exposing the /admin path externally when using a proxy to prevent unauthorized access. However, this vulnerability exploits the way certain proxies, specifically HAProxy, handle relative or non-normalized URL paths. By manipulating these paths, an attacker can bypass intended access restrictions and reach the /admin interface indirectly through the /realms path, which is expected to be publicly accessible. This flaw does not require authentication or user interaction and can be triggered remotely over the network. The vulnerability primarily risks confidentiality by potentially exposing sensitive administrative interfaces or information, but it does not impact integrity or availability. The CVSS 3.1 base score of 3.7 reflects the low severity due to the complexity of exploitation (high attack complexity) and limited impact. No patches or known exploits have been reported yet, but the issue highlights the importance of strict proxy path normalization and access control policies in Keycloak deployments.

Potential Impact

For European organizations, the impact is primarily limited to unauthorized disclosure of administrative interface access, which could lead to reconnaissance or further targeted attacks if combined with other vulnerabilities. Since Keycloak is widely used for identity and access management in enterprise environments, exposure of the /admin path could compromise the security posture of authentication systems. However, the vulnerability does not allow direct modification of data or service disruption, reducing its immediate risk. Organizations using HAProxy or similar proxies without strict path normalization are most at risk. The low CVSS score and absence of known exploits suggest limited current threat, but the potential for privilege escalation or information leakage remains if exploited. This could affect sectors with sensitive identity management needs such as finance, government, and healthcare across Europe.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Strictly follow Keycloak's guidance to never expose the /admin path externally when using proxies. 2) Configure proxies like HAProxy to enforce path normalization and reject relative or non-standard URL paths that could bypass access controls. 3) Use network segmentation and firewall rules to restrict access to administrative interfaces to trusted internal networks only. 4) Monitor proxy logs for suspicious path traversal or access attempts targeting /admin or related paths. 5) Regularly update Keycloak and proxy software to incorporate security patches once available. 6) Conduct penetration testing focused on proxy path handling to identify and remediate similar issues. 7) Employ Web Application Firewalls (WAFs) with rules to detect and block attempts to access administrative paths via indirect routes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-09-25T03:17:59.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69003706ba6dffc5e2309f16

Added to database: 10/28/2025, 3:22:46 AM

Last enriched: 11/14/2025, 2:42:24 AM

Last updated: 12/11/2025, 2:49:27 AM

Views: 417

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats