Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14777: Authentication Bypass by Alternate Name in Red Hat Red Hat Build of Keycloak

0
Medium
VulnerabilityCVE-2025-14777cvecve-2025-14777
Published: Tue Dec 16 2025 (12/16/2025, 05:02:42 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

A flaw was found in Keycloak. An IDOR (Broken Access Control) vulnerability exists in the admin API endpoints for authorization resource management, specifically in ResourceSetService and PermissionTicketService. The system checks authorization against the resourceServer (client) ID provided in the API request, but the backend database lookup and modification operations (findById, delete) only use the resourceId. This mismatch allows an authenticated attacker with fine-grained admin permissions for one client (e.g., Client A) to delete or update resources belonging to another client (Client B) within the same realm by supplying a valid resource ID.

AI-Powered Analysis

AILast updated: 12/16/2025, 05:35:00 UTC

Technical Analysis

CVE-2025-14777 is a broken access control vulnerability classified as an IDOR (Insecure Direct Object Reference) in the Red Hat Build of Keycloak, a widely used open-source identity and access management solution. The vulnerability specifically affects the admin API endpoints responsible for managing authorization resources, namely ResourceSetService and PermissionTicketService. The root cause is a logic flaw where the system performs authorization checks against the resourceServer (client) ID provided in the API request, but the backend database operations such as findById and delete only reference the resourceId without validating the associated client ownership. Consequently, an attacker who is authenticated and has fine-grained admin permissions scoped to one client (Client A) can manipulate resources belonging to another client (Client B) within the same realm by supplying a valid resource ID from Client B. This bypasses intended access controls, enabling unauthorized deletion or modification of resources. The vulnerability requires the attacker to have elevated privileges (admin permissions) but does not require user interaction, and it can be exploited remotely over the network. The CVSS v3.1 score of 6.0 reflects a medium severity, with low impact on confidentiality, high impact on integrity, and low impact on availability. No public exploits have been reported yet, but the flaw poses a significant risk to multi-tenant environments where multiple clients share a realm. The vulnerability highlights the importance of consistent authorization checks that bind resource operations to the correct client context. Organizations using Red Hat Build of Keycloak should monitor for patches and audit admin API usage to prevent unauthorized resource manipulation.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized modification or deletion of critical authorization resources across different clients within the same Keycloak realm. This compromises the integrity of access control policies and potentially disrupts service availability for affected clients. In multi-tenant environments, such as managed service providers or large enterprises with multiple internal clients, the risk is amplified as one compromised admin account could affect multiple clients. The breach of resource integrity could lead to privilege escalation, unauthorized access to sensitive applications, or denial of service conditions if critical permissions are altered or removed. Given Keycloak's role in federated identity management and single sign-on, exploitation could cascade into broader security incidents affecting user authentication and authorization across multiple systems. The medium severity rating suggests a moderate but non-trivial risk, particularly in environments where strict client isolation is required. European organizations subject to GDPR and other data protection regulations must consider the compliance implications of unauthorized access or modification of authorization data.

Mitigation Recommendations

To mitigate CVE-2025-14777, European organizations should immediately review and restrict fine-grained admin permissions to the minimum necessary scope, ensuring that admin roles are tightly scoped to specific clients. They should monitor and audit admin API usage logs for unusual resource modification patterns across clients. Applying vendor patches or updates as soon as they become available is critical to address the underlying authorization logic flaw. In the interim, consider implementing compensating controls such as network segmentation and multi-factor authentication for admin accounts to reduce the risk of credential compromise. Conduct thorough testing of authorization boundaries in staging environments to detect similar access control inconsistencies. Additionally, organizations should enforce strict client isolation policies within Keycloak realms and consider splitting clients into separate realms if feasible to limit cross-client impact. Regular security assessments and penetration testing focused on identity and access management components can help identify and remediate such vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-16T04:56:14.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6940ec04a4f72ecfcafbad2a

Added to database: 12/16/2025, 5:20:04 AM

Last enriched: 12/16/2025, 5:35:00 AM

Last updated: 12/16/2025, 12:34:45 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats