CVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat build of Keycloak 26.4
A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed.
AI Analysis
Technical Summary
CVE-2025-10939 identifies a vulnerability in the Red Hat build of Keycloak version 26.4 related to an uncontrolled search path element. Keycloak's official guidance recommends not exposing the /admin path externally when using a proxy to prevent unauthorized access. However, this vulnerability exploits the way certain proxies, specifically HAProxy, handle relative or non-normalized URL paths. By manipulating these paths, an attacker can bypass intended access restrictions and reach the /admin interface indirectly through the /realms path, which is expected to be publicly accessible. This flaw does not require authentication or user interaction and can be triggered remotely over the network. The vulnerability primarily risks confidentiality by potentially exposing sensitive administrative interfaces or information, but it does not impact integrity or availability. The CVSS 3.1 base score of 3.7 reflects the low severity due to the complexity of exploitation (high attack complexity) and limited impact. No patches or known exploits have been reported yet, but the issue highlights the importance of strict proxy path normalization and access control policies in Keycloak deployments.
Potential Impact
For European organizations, the impact is primarily limited to unauthorized disclosure of administrative interface access, which could lead to reconnaissance or further targeted attacks if combined with other vulnerabilities. Since Keycloak is widely used for identity and access management in enterprise environments, exposure of the /admin path could compromise the security posture of authentication systems. However, the vulnerability does not allow direct modification of data or service disruption, reducing its immediate risk. Organizations using HAProxy or similar proxies without strict path normalization are most at risk. The low CVSS score and absence of known exploits suggest limited current threat, but the potential for privilege escalation or information leakage remains if exploited. This could affect sectors with sensitive identity management needs such as finance, government, and healthcare across Europe.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Strictly follow Keycloak's guidance to never expose the /admin path externally when using proxies. 2) Configure proxies like HAProxy to enforce path normalization and reject relative or non-standard URL paths that could bypass access controls. 3) Use network segmentation and firewall rules to restrict access to administrative interfaces to trusted internal networks only. 4) Monitor proxy logs for suspicious path traversal or access attempts targeting /admin or related paths. 5) Regularly update Keycloak and proxy software to incorporate security patches once available. 6) Conduct penetration testing focused on proxy path handling to identify and remediate similar issues. 7) Employ Web Application Firewalls (WAFs) with rules to detect and block attempts to access administrative paths via indirect routes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat build of Keycloak 26.4
Description
A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed.
AI-Powered Analysis
Technical Analysis
CVE-2025-10939 identifies a vulnerability in the Red Hat build of Keycloak version 26.4 related to an uncontrolled search path element. Keycloak's official guidance recommends not exposing the /admin path externally when using a proxy to prevent unauthorized access. However, this vulnerability exploits the way certain proxies, specifically HAProxy, handle relative or non-normalized URL paths. By manipulating these paths, an attacker can bypass intended access restrictions and reach the /admin interface indirectly through the /realms path, which is expected to be publicly accessible. This flaw does not require authentication or user interaction and can be triggered remotely over the network. The vulnerability primarily risks confidentiality by potentially exposing sensitive administrative interfaces or information, but it does not impact integrity or availability. The CVSS 3.1 base score of 3.7 reflects the low severity due to the complexity of exploitation (high attack complexity) and limited impact. No patches or known exploits have been reported yet, but the issue highlights the importance of strict proxy path normalization and access control policies in Keycloak deployments.
Potential Impact
For European organizations, the impact is primarily limited to unauthorized disclosure of administrative interface access, which could lead to reconnaissance or further targeted attacks if combined with other vulnerabilities. Since Keycloak is widely used for identity and access management in enterprise environments, exposure of the /admin path could compromise the security posture of authentication systems. However, the vulnerability does not allow direct modification of data or service disruption, reducing its immediate risk. Organizations using HAProxy or similar proxies without strict path normalization are most at risk. The low CVSS score and absence of known exploits suggest limited current threat, but the potential for privilege escalation or information leakage remains if exploited. This could affect sectors with sensitive identity management needs such as finance, government, and healthcare across Europe.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Strictly follow Keycloak's guidance to never expose the /admin path externally when using proxies. 2) Configure proxies like HAProxy to enforce path normalization and reject relative or non-standard URL paths that could bypass access controls. 3) Use network segmentation and firewall rules to restrict access to administrative interfaces to trusted internal networks only. 4) Monitor proxy logs for suspicious path traversal or access attempts targeting /admin or related paths. 5) Regularly update Keycloak and proxy software to incorporate security patches once available. 6) Conduct penetration testing focused on proxy path handling to identify and remediate similar issues. 7) Employ Web Application Firewalls (WAFs) with rules to detect and block attempts to access administrative paths via indirect routes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-09-25T03:17:59.929Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69003706ba6dffc5e2309f16
Added to database: 10/28/2025, 3:22:46 AM
Last enriched: 11/14/2025, 2:42:24 AM
Last updated: 12/11/2025, 2:49:27 AM
Views: 417
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13764: CWE-269 Improper Privilege Management in ApusTheme WP CarDealer
CriticalCVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
MediumCVE-2025-67720: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Mayuri-Chan pyrofork
MediumCVE-2025-67719: CWE-620: Unverified Password Change in ibexa user
HighCVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.