Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14777: Authentication Bypass by Alternate Name in Red Hat Red Hat Build of Keycloak

0
Medium
VulnerabilityCVE-2025-14777cvecve-2025-14777
Published: Tue Dec 16 2025 (12/16/2025, 05:02:42 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

A flaw was found in Keycloak. An IDOR (Broken Access Control) vulnerability exists in the admin API endpoints for authorization resource management, specifically in ResourceSetService and PermissionTicketService. The system checks authorization against the resourceServer (client) ID provided in the API request, but the backend database lookup and modification operations (findById, delete) only use the resourceId. This mismatch allows an authenticated attacker with fine-grained admin permissions for one client (e.g., Client A) to delete or update resources belonging to another client (Client B) within the same realm by supplying a valid resource ID.

AI-Powered Analysis

AILast updated: 12/23/2025, 06:00:40 UTC

Technical Analysis

CVE-2025-14777 is a security vulnerability classified as an Insecure Direct Object Reference (IDOR) found in the Red Hat Build of Keycloak, a widely used open-source identity and access management solution. The vulnerability specifically affects the admin API endpoints responsible for managing authorization resources, namely ResourceSetService and PermissionTicketService. The root cause is a mismatch in authorization validation logic: while the API checks authorization against the resourceServer (client) ID provided in the request, the backend database operations such as findById and delete only use the resourceId without verifying the associated client. This discrepancy allows an authenticated attacker who has fine-grained administrative permissions for one client (Client A) within a realm to delete or update authorization resources that belong to a different client (Client B) in the same realm by supplying a valid resource ID. Exploitation requires the attacker to have elevated privileges (fine-grained admin rights) but does not require user interaction. The vulnerability impacts the integrity and availability of authorization resources by enabling unauthorized modifications or deletions, and it also affects confidentiality to a lesser extent since resource access controls can be bypassed. The CVSS v3.1 base score is 6.0 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, low confidentiality impact, high integrity impact, and low availability impact. No known exploits are reported in the wild as of the publication date. The vulnerability underscores the importance of consistent authorization checks across API layers and backend operations in identity management systems.

Potential Impact

For European organizations relying on Red Hat Build of Keycloak for identity and access management, this vulnerability poses a risk of unauthorized modification or deletion of authorization resources across clients within the same realm. This can lead to privilege escalation scenarios, disruption of access controls, and potential denial of service for affected clients. Confidentiality impact is limited but present since unauthorized resource manipulation could expose sensitive authorization configurations. The integrity of authorization policies is significantly impacted, potentially allowing attackers to bypass intended access restrictions. Availability impact is low but possible if critical authorization resources are deleted. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, government) could face regulatory and operational consequences if access controls are compromised. The requirement for authenticated access with fine-grained admin permissions limits the attack surface to insiders or compromised admin accounts, but the risk remains significant in multi-tenant or complex realm environments common in large European enterprises and public sector deployments.

Mitigation Recommendations

1. Apply official patches or updates from Red Hat as soon as they become available to address this vulnerability. 2. Conduct a thorough audit of admin permissions and roles within Keycloak realms to ensure that fine-grained admin privileges are granted only to trusted personnel and are limited in scope. 3. Implement additional access control validations at the API and backend layers to ensure resourceServer (client) ID and resourceId are consistently checked and matched before any modification or deletion operations. 4. Monitor and log all administrative API calls related to authorization resource management to detect anomalous or unauthorized activities. 5. Employ network segmentation and strong authentication mechanisms (e.g., multi-factor authentication) for admin accounts to reduce the risk of credential compromise. 6. Regularly review and test Keycloak configurations and customizations for potential access control weaknesses. 7. Consider isolating critical clients into separate realms to minimize cross-client impact in case of exploitation. 8. Educate administrators on the risks of privilege misuse and enforce least privilege principles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-16T04:56:14.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6940ec04a4f72ecfcafbad2a

Added to database: 12/16/2025, 5:20:04 AM

Last enriched: 12/23/2025, 6:00:40 AM

Last updated: 2/7/2026, 11:41:42 AM

Views: 260

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats