Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14082: Improper Access Control in Red Hat Red Hat Build of Keycloak

0
Low
VulnerabilityCVE-2025-14082cvecve-2025-14082
Published: Wed Dec 10 2025 (12/10/2025, 09:04:51 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

A flaw was found in Keycloak Admin REST (Representational State Transfer) API. This vulnerability allows information disclosure of sensitive role metadata via insufficient authorization checks on the /admin/realms/{realm}/roles endpoint.

AI-Powered Analysis

AILast updated: 01/16/2026, 09:28:50 UTC

Technical Analysis

CVE-2025-14082 identifies an improper access control vulnerability in the Red Hat Build of Keycloak, specifically within the Admin REST API's /admin/realms/{realm}/roles endpoint. This flaw allows an attacker with high-level privileges—typically an authenticated administrator—to retrieve sensitive role metadata that should be protected by authorization checks. The vulnerability arises from insufficient enforcement of authorization policies, permitting disclosure of role-related information that could aid in privilege escalation or reconnaissance within an organization's identity management system. The vulnerability does not allow modification of data or disruption of services, limiting its impact to confidentiality. The CVSS 3.1 score of 2.7 reflects this limited impact and the requirement for privileged access. No public exploits have been reported, indicating low immediate risk. However, given Keycloak's widespread use as an open-source identity and access management solution, particularly in enterprise environments, the vulnerability could be leveraged internally or by malicious insiders to gain insights into role configurations. The lack of available patches at the time of reporting necessitates interim mitigations such as strict access controls and monitoring. This vulnerability underscores the importance of rigorous authorization checks in administrative APIs to prevent information leakage.

Potential Impact

For European organizations, the primary impact of CVE-2025-14082 is the potential unauthorized disclosure of sensitive role metadata within Keycloak deployments. This information could facilitate internal reconnaissance, enabling attackers or malicious insiders to map out role hierarchies and permissions, potentially aiding future privilege escalation attempts. Although the vulnerability does not directly compromise data integrity or availability, the confidentiality breach could undermine trust in identity management systems and expose sensitive organizational structures. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, may face compliance risks if sensitive role information is leaked. The requirement for high-level privileges limits exploitation to insiders or compromised admin accounts, but the risk remains significant in environments with insufficient internal controls. Given Keycloak's role in managing authentication and authorization, any information disclosure could indirectly increase the attack surface for targeted attacks.

Mitigation Recommendations

To mitigate CVE-2025-14082, organizations should implement the following specific measures: 1) Apply official patches or updates from Red Hat promptly once available to address the authorization flaw. 2) Restrict access to the Keycloak Admin REST API endpoints strictly to trusted administrators using network segmentation, VPNs, or zero-trust principles. 3) Enforce strong authentication and authorization policies for admin accounts, including multi-factor authentication and least privilege principles. 4) Regularly audit and monitor access logs for unusual or unauthorized access attempts to the /admin/realms/{realm}/roles endpoint. 5) Consider implementing additional application-layer access controls or API gateways that can provide fine-grained authorization checks beyond Keycloak’s native controls. 6) Educate administrators about the sensitivity of role metadata and the importance of safeguarding admin credentials. 7) Conduct periodic security assessments and penetration tests focusing on identity management components to detect similar weaknesses. These targeted actions go beyond generic advice by focusing on the specific API endpoint and administrative context of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-05T05:32:13.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69393d10fd479f45ea600bd4

Added to database: 12/10/2025, 9:27:44 AM

Last enriched: 1/16/2026, 9:28:50 AM

Last updated: 2/6/2026, 9:25:26 PM

Views: 289

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats