CVE-2025-14778: Incorrect Privilege Assignment in Red Hat Red Hat build of Keycloak 26.2
A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only verifies the caller's ownership against the first resource in the policy's list. This allows a user (Owner A) who owns one resource (RA) to update a shared policy and modify authorization rules for other resources (e.g., RB) in that same policy, even if those other resources are owned by a different user (Owner B). This constitutes a horizontal privilege escalation.
AI Analysis
Technical Summary
CVE-2025-14778 is a vulnerability identified in the Red Hat Build of Keycloak, specifically within the UserManagedPermissionService (UMA Protection API). The issue arises from improper privilege checks when updating or deleting UMA policies that are associated with multiple resources. The authorization logic only verifies the caller's ownership against the first resource in the policy's resource list. Consequently, a user who owns one resource (Owner A) can modify or delete a shared UMA policy and thereby alter authorization rules for other resources (e.g., RB) owned by different users (Owner B). This flaw constitutes a horizontal privilege escalation, allowing unauthorized modification of access controls across resources. The vulnerability has a CVSS 3.1 base score of 5.4 (medium severity), reflecting network exploitability (AV:N), low attack complexity (AC:L), required privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and limited impact on confidentiality and integrity (C:L, I:L), with no impact on availability (A:N). There are no known exploits in the wild, and no patches or affected versions were explicitly listed at the time of disclosure. The vulnerability affects environments where multiple resources share UMA policies and where users have ownership of at least one resource in such policies. This flaw could lead to unauthorized access control changes, potentially exposing sensitive data or compromising resource integrity.
Potential Impact
For European organizations, the impact of CVE-2025-14778 can be significant, especially for those relying on Red Hat Build of Keycloak for identity and access management in multi-tenant or collaborative environments. The vulnerability allows horizontal privilege escalation, enabling users to modify access controls on resources they do not own. This can lead to unauthorized data exposure, manipulation of permissions, and potential compliance violations under GDPR and other data protection regulations. Confidentiality and integrity of sensitive information may be compromised, particularly in sectors like finance, healthcare, and government where strict access controls are critical. Although availability is not affected, the breach of trust and control over resource permissions could disrupt business operations and damage organizational reputation. The medium CVSS score reflects a moderate risk, but the ease of exploitation (network accessible, no user interaction) and the potential for lateral privilege abuse warrant prompt attention. Organizations with complex UMA policy configurations are at higher risk, as the flaw exploits shared policy scenarios.
Mitigation Recommendations
To mitigate CVE-2025-14778, European organizations should: 1) Monitor Red Hat and Keycloak vendor advisories closely and apply security patches immediately once available. 2) Conduct a thorough audit of existing UMA policies, especially those shared across multiple resources, to identify and isolate policies that could be exploited. 3) Implement strict policy ownership verification processes and consider restricting shared UMA policies where feasible. 4) Enhance logging and monitoring of UMA policy modifications to detect unauthorized changes promptly. 5) Limit user privileges to the minimum necessary, reducing the number of users who can create or modify UMA policies. 6) Consider deploying compensating controls such as additional access reviews or multi-factor authentication for users managing UMA policies. 7) Educate administrators and developers about the risks of shared policies and encourage best practices in resource ownership and policy management. 8) If possible, segregate resources and policies to minimize cross-resource privilege escalation opportunities. These steps go beyond generic advice by focusing on the specific nature of the vulnerability and the UMA policy management context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-14778: Incorrect Privilege Assignment in Red Hat Red Hat build of Keycloak 26.2
Description
A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only verifies the caller's ownership against the first resource in the policy's list. This allows a user (Owner A) who owns one resource (RA) to update a shared policy and modify authorization rules for other resources (e.g., RB) in that same policy, even if those other resources are owned by a different user (Owner B). This constitutes a horizontal privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2025-14778 is a vulnerability identified in the Red Hat Build of Keycloak, specifically within the UserManagedPermissionService (UMA Protection API). The issue arises from improper privilege checks when updating or deleting UMA policies that are associated with multiple resources. The authorization logic only verifies the caller's ownership against the first resource in the policy's resource list. Consequently, a user who owns one resource (Owner A) can modify or delete a shared UMA policy and thereby alter authorization rules for other resources (e.g., RB) owned by different users (Owner B). This flaw constitutes a horizontal privilege escalation, allowing unauthorized modification of access controls across resources. The vulnerability has a CVSS 3.1 base score of 5.4 (medium severity), reflecting network exploitability (AV:N), low attack complexity (AC:L), required privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and limited impact on confidentiality and integrity (C:L, I:L), with no impact on availability (A:N). There are no known exploits in the wild, and no patches or affected versions were explicitly listed at the time of disclosure. The vulnerability affects environments where multiple resources share UMA policies and where users have ownership of at least one resource in such policies. This flaw could lead to unauthorized access control changes, potentially exposing sensitive data or compromising resource integrity.
Potential Impact
For European organizations, the impact of CVE-2025-14778 can be significant, especially for those relying on Red Hat Build of Keycloak for identity and access management in multi-tenant or collaborative environments. The vulnerability allows horizontal privilege escalation, enabling users to modify access controls on resources they do not own. This can lead to unauthorized data exposure, manipulation of permissions, and potential compliance violations under GDPR and other data protection regulations. Confidentiality and integrity of sensitive information may be compromised, particularly in sectors like finance, healthcare, and government where strict access controls are critical. Although availability is not affected, the breach of trust and control over resource permissions could disrupt business operations and damage organizational reputation. The medium CVSS score reflects a moderate risk, but the ease of exploitation (network accessible, no user interaction) and the potential for lateral privilege abuse warrant prompt attention. Organizations with complex UMA policy configurations are at higher risk, as the flaw exploits shared policy scenarios.
Mitigation Recommendations
To mitigate CVE-2025-14778, European organizations should: 1) Monitor Red Hat and Keycloak vendor advisories closely and apply security patches immediately once available. 2) Conduct a thorough audit of existing UMA policies, especially those shared across multiple resources, to identify and isolate policies that could be exploited. 3) Implement strict policy ownership verification processes and consider restricting shared UMA policies where feasible. 4) Enhance logging and monitoring of UMA policy modifications to detect unauthorized changes promptly. 5) Limit user privileges to the minimum necessary, reducing the number of users who can create or modify UMA policies. 6) Consider deploying compensating controls such as additional access reviews or multi-factor authentication for users managing UMA policies. 7) Educate administrators and developers about the risks of shared policies and encourage best practices in resource ownership and policy management. 8) If possible, segregate resources and policies to minimize cross-resource privilege escalation opportunities. These steps go beyond generic advice by focusing on the specific nature of the vulnerability and the UMA policy management context.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2025-12-16T05:02:19.510Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a36074b57a58fa16ab1b0
Added to database: 2/9/2026, 7:31:19 PM
Last enriched: 2/9/2026, 7:48:38 PM
Last updated: 2/21/2026, 12:16:55 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.