Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5416: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Red Hat Red Hat Build of Keycloak

0
Low
VulnerabilityCVE-2025-5416cvecve-2025-5416
Published: Fri Jun 20 2025 (06/20/2025, 16:04:05 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

A vulnerability has been identified in Keycloak that could lead to unauthorized information disclosure. While it requires an already authenticated user, the /admin/serverinfo endpoint can inadvertently provide sensitive environment information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:18:28 UTC

Technical Analysis

CVE-2025-5416 is a security vulnerability identified in the Red Hat Build of Keycloak, an open-source identity and access management solution widely used for authentication and authorization services. The vulnerability arises from the /admin/serverinfo endpoint, which, when accessed by an authenticated user, can inadvertently disclose sensitive system environment information. This information may include configuration details, environment variables, or other metadata that could assist an attacker in mapping the system or planning further attacks. The vulnerability requires that the attacker already has valid credentials, as it demands authenticated access, and no user interaction is needed beyond authentication. The CVSS 3.1 base score is 2.7, indicating a low severity primarily due to limited confidentiality impact and no impact on integrity or availability. The attack vector is network-based with low attack complexity, but high privileges are required (PR:H). No known exploits have been reported in the wild, and no patches have been explicitly linked in the provided information. The vulnerability is classified as an information disclosure issue, which does not directly compromise system control but can aid attackers in reconnaissance phases of an attack lifecycle. Given Keycloak's role in managing authentication, any leakage of environment details could potentially expose sensitive deployment information, such as server configurations or internal endpoints, which could be leveraged in chained attacks.

Potential Impact

The primary impact of CVE-2025-5416 is unauthorized disclosure of sensitive system information to authenticated users who should not have access to such details. While the vulnerability does not allow direct compromise of system integrity or availability, the leaked information could facilitate more targeted and effective attacks by revealing system configurations, environment variables, or other metadata. For organizations, this could mean an increased risk of privilege escalation, lateral movement, or exploitation of other vulnerabilities once attackers gain initial access. Since Keycloak is often deployed in critical identity and access management roles, any information leakage could indirectly affect the security posture of connected applications and services. However, the requirement for authenticated access limits the scope of potential attackers to insiders or compromised accounts. The absence of known exploits and the low CVSS score suggest a limited immediate threat, but the exposure of environment information is a recognized risk factor in multi-stage attacks.

Mitigation Recommendations

To mitigate CVE-2025-5416, organizations should implement strict access controls on the /admin/serverinfo endpoint, ensuring that only highly trusted administrators with a genuine need can access this information. Employ role-based access control (RBAC) policies to minimize the number of users with permissions to access administrative endpoints. Monitor and audit access logs for unusual or unauthorized access attempts to the /admin/serverinfo endpoint. Consider network segmentation or firewall rules to restrict access to Keycloak administrative interfaces to trusted networks or VPNs. Stay alert for official patches or updates from Red Hat and apply them promptly once available. Additionally, review Keycloak configuration to disable or limit exposure of sensitive environment information where possible. Employ multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. Finally, conduct regular security assessments and penetration testing focused on identity management systems to detect and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-31T22:31:34.145Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68568e82aded773421b5a8d1

Added to database: 6/21/2025, 10:50:42 AM

Last enriched: 2/27/2026, 3:18:28 PM

Last updated: 3/26/2026, 11:13:02 AM

Views: 277

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses