CVE-2025-13881: Incorrect Privilege Assignment in Red Hat Red Hat build of Keycloak 26.4
A flaw was found in Keycloak Admin API. This vulnerability allows an administrator with limited privileges to retrieve sensitive custom attributes via the /unmanagedAttributes endpoint, bypassing User Profile visibility settings.
AI Analysis
Technical Summary
CVE-2025-13881 identifies a security vulnerability in the Red Hat build of Keycloak version 26.4, specifically within the Admin API's handling of user profile data. The vulnerability stems from incorrect privilege assignment that allows administrators with limited privileges to access sensitive custom user attributes via the /unmanagedAttributes endpoint. Normally, Keycloak enforces User Profile visibility settings to restrict access to such attributes, but this flaw bypasses those controls, exposing potentially sensitive information. The vulnerability requires an attacker to have at least limited administrative privileges, which means it cannot be exploited by unauthenticated or low-privilege users. The CVSS 3.1 base score is 2.7, reflecting a low severity primarily due to the limited confidentiality impact and the prerequisite of elevated privileges. There is no impact on integrity or availability, and no user interaction is needed. The vulnerability does not appear to have known exploits in the wild at this time. The flaw highlights the importance of strict privilege management and the need for careful API access control in identity and access management systems like Keycloak. Since Keycloak is widely used for identity federation and access management in enterprise environments, this vulnerability could expose sensitive user metadata if exploited.
Potential Impact
The primary impact of CVE-2025-13881 is the unauthorized disclosure of sensitive custom user attributes to administrators who should not have access to them. This could lead to privacy violations, leakage of confidential user information, and potential compliance issues for organizations handling sensitive data. While the vulnerability does not affect system integrity or availability, the exposure of sensitive attributes could be leveraged in social engineering or targeted attacks if the data includes personally identifiable information or security-related metadata. Organizations relying on Keycloak for identity management may face reputational damage and regulatory scrutiny if such data is improperly accessed. However, the requirement for limited administrator privileges reduces the risk of widespread exploitation, as attackers must already have some level of trusted access. The absence of known exploits in the wild further limits immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
Organizations should immediately review and audit the assignment of administrative privileges within their Keycloak deployments to ensure the principle of least privilege is enforced. Restrict access to the Admin API endpoints, especially /unmanagedAttributes, to only fully trusted administrators. Monitor administrative activity logs for unusual access patterns to sensitive user attributes. Stay current with Red Hat security advisories and apply patches or updates as soon as they become available for Keycloak 26.4. Consider implementing additional access controls or API gateway policies to limit exposure of sensitive endpoints. If possible, temporarily disable or restrict the /unmanagedAttributes endpoint until a patch is released. Conduct internal penetration testing and vulnerability assessments focusing on privilege escalation and API access controls. Educate administrators on the sensitivity of custom user attributes and the importance of secure privilege management.
Affected Countries
United States, Germany, United Kingdom, France, India, Japan, Canada, Australia, Brazil, South Korea
CVE-2025-13881: Incorrect Privilege Assignment in Red Hat Red Hat build of Keycloak 26.4
Description
A flaw was found in Keycloak Admin API. This vulnerability allows an administrator with limited privileges to retrieve sensitive custom attributes via the /unmanagedAttributes endpoint, bypassing User Profile visibility settings.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13881 identifies a security vulnerability in the Red Hat build of Keycloak version 26.4, specifically within the Admin API's handling of user profile data. The vulnerability stems from incorrect privilege assignment that allows administrators with limited privileges to access sensitive custom user attributes via the /unmanagedAttributes endpoint. Normally, Keycloak enforces User Profile visibility settings to restrict access to such attributes, but this flaw bypasses those controls, exposing potentially sensitive information. The vulnerability requires an attacker to have at least limited administrative privileges, which means it cannot be exploited by unauthenticated or low-privilege users. The CVSS 3.1 base score is 2.7, reflecting a low severity primarily due to the limited confidentiality impact and the prerequisite of elevated privileges. There is no impact on integrity or availability, and no user interaction is needed. The vulnerability does not appear to have known exploits in the wild at this time. The flaw highlights the importance of strict privilege management and the need for careful API access control in identity and access management systems like Keycloak. Since Keycloak is widely used for identity federation and access management in enterprise environments, this vulnerability could expose sensitive user metadata if exploited.
Potential Impact
The primary impact of CVE-2025-13881 is the unauthorized disclosure of sensitive custom user attributes to administrators who should not have access to them. This could lead to privacy violations, leakage of confidential user information, and potential compliance issues for organizations handling sensitive data. While the vulnerability does not affect system integrity or availability, the exposure of sensitive attributes could be leveraged in social engineering or targeted attacks if the data includes personally identifiable information or security-related metadata. Organizations relying on Keycloak for identity management may face reputational damage and regulatory scrutiny if such data is improperly accessed. However, the requirement for limited administrator privileges reduces the risk of widespread exploitation, as attackers must already have some level of trusted access. The absence of known exploits in the wild further limits immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
Organizations should immediately review and audit the assignment of administrative privileges within their Keycloak deployments to ensure the principle of least privilege is enforced. Restrict access to the Admin API endpoints, especially /unmanagedAttributes, to only fully trusted administrators. Monitor administrative activity logs for unusual access patterns to sensitive user attributes. Stay current with Red Hat security advisories and apply patches or updates as soon as they become available for Keycloak 26.4. Consider implementing additional access controls or API gateway policies to limit exposure of sensitive endpoints. If possible, temporarily disable or restrict the /unmanagedAttributes endpoint until a patch is released. Conduct internal penetration testing and vulnerability assessments focusing on privilege escalation and API access controls. Educate administrators on the sensitivity of custom user attributes and the importance of secure privilege management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2025-12-02T14:06:42.988Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69803cdcac06320222bdf09f
Added to database: 2/2/2026, 5:57:48 AM
Last enriched: 2/27/2026, 10:26:04 AM
Last updated: 3/24/2026, 12:31:28 AM
Views: 150
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.