CVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat build of Keycloak 26.4
CVE-2025-10939 is a low-severity vulnerability in the Red Hat build of Keycloak 26. 4 involving an uncontrolled search path element. The issue arises when a proxy, such as HAProxy, is used and relative or non-normalized paths can be exploited to access the /admin path, which is recommended to be blocked from external exposure. This flaw could allow unauthorized users to reach administrative interfaces indirectly via the /realms path, potentially bypassing intended access restrictions. The vulnerability does not require authentication or user interaction but has a low impact limited to confidentiality with no integrity or availability effects. No known exploits are currently reported in the wild. European organizations using Keycloak behind proxies should review their proxy configurations to ensure strict path normalization and access controls. Countries with significant Red Hat and Keycloak adoption, especially those with critical identity management infrastructures, are more likely to be affected. Given the low CVSS score (3. 7) and the nature of the flaw, the overall risk is low but warrants attention to prevent potential reconnaissance or limited information disclosure.
AI Analysis
Technical Summary
CVE-2025-10939 identifies a vulnerability in the Red Hat build of Keycloak version 26.4 related to an uncontrolled search path element when deployed behind certain proxies, notably HAProxy. Keycloak's official guidance advises against exposing the /admin path externally when using a proxy to prevent unauthorized access. However, this vulnerability allows an attacker to exploit relative or non-normalized URL paths to circumvent these restrictions. Specifically, HAProxy can be tricked into resolving paths relative to /realms, which is typically exposed, thereby enabling indirect access to the /admin interface. This flaw stems from insufficient path normalization and validation in the proxy configuration or Keycloak's handling of proxied requests. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The impact is limited to confidentiality, as unauthorized access to the admin path could reveal sensitive administrative interfaces or information, but it does not allow modification or disruption of services. The CVSS v3.1 score is 3.7 (low), reflecting the limited impact and the requirement for a complex attack vector involving proxy misconfiguration. No patches or known exploits are currently documented, but the issue highlights the importance of secure proxy setups and strict path normalization to prevent unauthorized access to administrative endpoints in identity management systems like Keycloak.
Potential Impact
For European organizations, the primary impact of CVE-2025-10939 lies in potential unauthorized access to administrative interfaces of Keycloak deployments, which could lead to information disclosure about the identity management system's configuration or administrative functions. While the vulnerability does not directly allow modification or denial of service, exposure of the /admin path could facilitate further reconnaissance or targeted attacks against identity infrastructure. Organizations relying on Keycloak for authentication and authorization services may face increased risk if proxy configurations are not hardened, potentially compromising the confidentiality of sensitive identity management data. The impact is more pronounced in sectors with stringent identity and access management requirements, such as finance, healthcare, and government institutions. However, given the low severity and absence of known exploits, the immediate risk is limited but should not be ignored. Failure to address this vulnerability could undermine trust in identity services and complicate compliance with data protection regulations like GDPR if sensitive administrative information is leaked.
Mitigation Recommendations
To mitigate CVE-2025-10939, European organizations should implement the following specific measures: 1) Review and harden proxy configurations, especially HAProxy, to enforce strict path normalization and reject relative or non-normalized URL paths that could be exploited to access restricted endpoints. 2) Explicitly block external access to the /admin path on proxies and firewalls, ensuring it is only accessible from trusted internal networks. 3) Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious path traversal or manipulation attempts targeting Keycloak endpoints. 4) Monitor access logs for unusual requests attempting to access /admin via indirect paths and investigate anomalies promptly. 5) Keep Keycloak and proxy software up to date with the latest security patches and advisories from Red Hat and proxy vendors. 6) Conduct regular security assessments and penetration tests focusing on proxy configurations and identity management interfaces to detect similar path-related vulnerabilities. 7) Educate system administrators on secure proxy deployment best practices and the importance of adhering to Keycloak's security guidelines regarding path exposure. These targeted actions go beyond generic advice by focusing on proxy path handling and access control specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat build of Keycloak 26.4
Description
CVE-2025-10939 is a low-severity vulnerability in the Red Hat build of Keycloak 26. 4 involving an uncontrolled search path element. The issue arises when a proxy, such as HAProxy, is used and relative or non-normalized paths can be exploited to access the /admin path, which is recommended to be blocked from external exposure. This flaw could allow unauthorized users to reach administrative interfaces indirectly via the /realms path, potentially bypassing intended access restrictions. The vulnerability does not require authentication or user interaction but has a low impact limited to confidentiality with no integrity or availability effects. No known exploits are currently reported in the wild. European organizations using Keycloak behind proxies should review their proxy configurations to ensure strict path normalization and access controls. Countries with significant Red Hat and Keycloak adoption, especially those with critical identity management infrastructures, are more likely to be affected. Given the low CVSS score (3. 7) and the nature of the flaw, the overall risk is low but warrants attention to prevent potential reconnaissance or limited information disclosure.
AI-Powered Analysis
Technical Analysis
CVE-2025-10939 identifies a vulnerability in the Red Hat build of Keycloak version 26.4 related to an uncontrolled search path element when deployed behind certain proxies, notably HAProxy. Keycloak's official guidance advises against exposing the /admin path externally when using a proxy to prevent unauthorized access. However, this vulnerability allows an attacker to exploit relative or non-normalized URL paths to circumvent these restrictions. Specifically, HAProxy can be tricked into resolving paths relative to /realms, which is typically exposed, thereby enabling indirect access to the /admin interface. This flaw stems from insufficient path normalization and validation in the proxy configuration or Keycloak's handling of proxied requests. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The impact is limited to confidentiality, as unauthorized access to the admin path could reveal sensitive administrative interfaces or information, but it does not allow modification or disruption of services. The CVSS v3.1 score is 3.7 (low), reflecting the limited impact and the requirement for a complex attack vector involving proxy misconfiguration. No patches or known exploits are currently documented, but the issue highlights the importance of secure proxy setups and strict path normalization to prevent unauthorized access to administrative endpoints in identity management systems like Keycloak.
Potential Impact
For European organizations, the primary impact of CVE-2025-10939 lies in potential unauthorized access to administrative interfaces of Keycloak deployments, which could lead to information disclosure about the identity management system's configuration or administrative functions. While the vulnerability does not directly allow modification or denial of service, exposure of the /admin path could facilitate further reconnaissance or targeted attacks against identity infrastructure. Organizations relying on Keycloak for authentication and authorization services may face increased risk if proxy configurations are not hardened, potentially compromising the confidentiality of sensitive identity management data. The impact is more pronounced in sectors with stringent identity and access management requirements, such as finance, healthcare, and government institutions. However, given the low severity and absence of known exploits, the immediate risk is limited but should not be ignored. Failure to address this vulnerability could undermine trust in identity services and complicate compliance with data protection regulations like GDPR if sensitive administrative information is leaked.
Mitigation Recommendations
To mitigate CVE-2025-10939, European organizations should implement the following specific measures: 1) Review and harden proxy configurations, especially HAProxy, to enforce strict path normalization and reject relative or non-normalized URL paths that could be exploited to access restricted endpoints. 2) Explicitly block external access to the /admin path on proxies and firewalls, ensuring it is only accessible from trusted internal networks. 3) Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious path traversal or manipulation attempts targeting Keycloak endpoints. 4) Monitor access logs for unusual requests attempting to access /admin via indirect paths and investigate anomalies promptly. 5) Keep Keycloak and proxy software up to date with the latest security patches and advisories from Red Hat and proxy vendors. 6) Conduct regular security assessments and penetration tests focusing on proxy configurations and identity management interfaces to detect similar path-related vulnerabilities. 7) Educate system administrators on secure proxy deployment best practices and the importance of adhering to Keycloak's security guidelines regarding path exposure. These targeted actions go beyond generic advice by focusing on proxy path handling and access control specific to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-09-25T03:17:59.929Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69003706ba6dffc5e2309f16
Added to database: 10/28/2025, 3:22:46 AM
Last enriched: 12/19/2025, 8:49:49 PM
Last updated: 2/8/2026, 3:53:26 AM
Views: 497
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2131: OS Command Injection in XixianLiang HarmonyOS-mcp-server
MediumCVE-2026-2130: Command Injection in BurtTheCoder mcp-maigret
MediumCVE-2026-2209: Improper Authorization in WeKan
MediumCVE-2026-2208: Missing Authorization in WeKan
MediumCVE-2026-2207: Information Disclosure in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.