Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13881: Incorrect Privilege Assignment in Red Hat Red Hat build of Keycloak 26.4

0
Low
VulnerabilityCVE-2025-13881cvecve-2025-13881
Published: Mon Feb 02 2026 (02/02/2026, 05:43:22 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.4

Description

A flaw was found in Keycloak Admin API. This vulnerability allows an administrator with limited privileges to retrieve sensitive custom attributes via the /unmanagedAttributes endpoint, bypassing User Profile visibility settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:26:04 UTC

Technical Analysis

CVE-2025-13881 identifies a security vulnerability in the Red Hat build of Keycloak version 26.4, specifically within the Admin API's handling of user profile data. The vulnerability stems from incorrect privilege assignment that allows administrators with limited privileges to access sensitive custom user attributes via the /unmanagedAttributes endpoint. Normally, Keycloak enforces User Profile visibility settings to restrict access to such attributes, but this flaw bypasses those controls, exposing potentially sensitive information. The vulnerability requires an attacker to have at least limited administrative privileges, which means it cannot be exploited by unauthenticated or low-privilege users. The CVSS 3.1 base score is 2.7, reflecting a low severity primarily due to the limited confidentiality impact and the prerequisite of elevated privileges. There is no impact on integrity or availability, and no user interaction is needed. The vulnerability does not appear to have known exploits in the wild at this time. The flaw highlights the importance of strict privilege management and the need for careful API access control in identity and access management systems like Keycloak. Since Keycloak is widely used for identity federation and access management in enterprise environments, this vulnerability could expose sensitive user metadata if exploited.

Potential Impact

The primary impact of CVE-2025-13881 is the unauthorized disclosure of sensitive custom user attributes to administrators who should not have access to them. This could lead to privacy violations, leakage of confidential user information, and potential compliance issues for organizations handling sensitive data. While the vulnerability does not affect system integrity or availability, the exposure of sensitive attributes could be leveraged in social engineering or targeted attacks if the data includes personally identifiable information or security-related metadata. Organizations relying on Keycloak for identity management may face reputational damage and regulatory scrutiny if such data is improperly accessed. However, the requirement for limited administrator privileges reduces the risk of widespread exploitation, as attackers must already have some level of trusted access. The absence of known exploits in the wild further limits immediate risk but does not eliminate the need for remediation.

Mitigation Recommendations

Organizations should immediately review and audit the assignment of administrative privileges within their Keycloak deployments to ensure the principle of least privilege is enforced. Restrict access to the Admin API endpoints, especially /unmanagedAttributes, to only fully trusted administrators. Monitor administrative activity logs for unusual access patterns to sensitive user attributes. Stay current with Red Hat security advisories and apply patches or updates as soon as they become available for Keycloak 26.4. Consider implementing additional access controls or API gateway policies to limit exposure of sensitive endpoints. If possible, temporarily disable or restrict the /unmanagedAttributes endpoint until a patch is released. Conduct internal penetration testing and vulnerability assessments focusing on privilege escalation and API access controls. Educate administrators on the sensitivity of custom user attributes and the importance of secure privilege management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-02T14:06:42.988Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69803cdcac06320222bdf09f

Added to database: 2/2/2026, 5:57:48 AM

Last enriched: 2/27/2026, 10:26:04 AM

Last updated: 3/24/2026, 12:31:28 AM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses