Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14559: CWE-840 in Red Hat Red Hat build of Keycloak 26.4

0
Medium
VulnerabilityCVE-2025-14559cvecve-2025-14559cwe-840
Published: Wed Jan 21 2026 (01/21/2026, 06:13:31 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.4

Description

A flaw was found in the keycloak-services component of Keycloak. This vulnerability allows the issuance of access and refresh tokens for disabled users, leading to unauthorized use of previously revoked privileges, via a business logic vulnerability in the Token Exchange implementation when a privileged client invokes the token exchange flow.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:26:47 UTC

Technical Analysis

CVE-2025-14559 is a vulnerability classified under CWE-840 (Business Logic Errors) found in the keycloak-services component of the Red Hat build of Keycloak version 26.4. The flaw arises from improper handling of the token exchange process, a feature that allows a privileged client to exchange tokens on behalf of users. Due to a business logic error, the system incorrectly permits the issuance of access and refresh tokens for users who have been disabled, effectively bypassing the intended revocation of their privileges. This means that a privileged client can continue to obtain valid tokens for accounts that should no longer have access, leading to unauthorized access and potential privilege escalation. The vulnerability requires the attacker to have high privileges (PR:H) and does not require user interaction (UI:N). The attack vector is network-based (AV:N), making remote exploitation possible if the attacker has the necessary privileges. The impact affects confidentiality and integrity (C:H/I:H) but does not affect availability (A:N). The vulnerability is rated with a CVSS 3.1 score of 6.5, reflecting medium severity. No patches or known exploits are currently documented, but the flaw poses a significant risk in environments where token exchange is used and disabled users' tokens must be strictly revoked. The issue highlights the importance of robust business logic validation in authentication flows to prevent unauthorized access.

Potential Impact

The primary impact of CVE-2025-14559 is unauthorized access through the issuance of valid tokens for disabled users, undermining the access control mechanisms of organizations using Keycloak for identity and access management. This can lead to privilege escalation where attackers or malicious insiders with privileged client access maintain or regain access to sensitive systems and data despite user account revocation. Confidentiality and integrity of sensitive information are at risk, as attackers can impersonate disabled users and perform unauthorized actions. Although availability is not directly impacted, the breach of trust and potential data exposure can have severe operational and reputational consequences. Organizations relying on Keycloak for critical authentication services, especially in regulated industries or government sectors, may face compliance violations and increased risk of data breaches. The requirement for high privileges to exploit somewhat limits the attack surface but does not eliminate risk, especially in complex environments with multiple privileged clients.

Mitigation Recommendations

To mitigate CVE-2025-14559, organizations should: 1) Apply any available patches or updates from Red Hat or the Keycloak project as soon as they are released to address the token exchange logic flaw. 2) Review and restrict privileged client permissions to the minimum necessary, limiting which clients can invoke the token exchange flow. 3) Implement strict monitoring and auditing of token exchange requests, especially those involving disabled users, to detect anomalous or unauthorized token issuance. 4) Enforce timely and comprehensive user disablement procedures, ensuring that token revocation mechanisms are tested and effective. 5) Consider additional compensating controls such as multi-factor authentication and anomaly detection on token usage to reduce risk from compromised tokens. 6) Conduct regular security reviews of business logic in authentication flows to identify and remediate similar logic errors proactively. 7) Isolate and segment identity management infrastructure to reduce the impact of potential token misuse. These steps go beyond generic advice by focusing on privilege management, monitoring, and business logic validation specific to token exchange processes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-12T05:37:44.269Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697070494623b1157cabd775

Added to database: 1/21/2026, 6:20:57 AM

Last enriched: 2/27/2026, 11:26:47 AM

Last updated: 3/25/2026, 11:33:00 PM

Views: 174

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses