Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7784: Improper Privilege Management

0
Medium
VulnerabilityCVE-2025-7784cvecve-2025-7784
Published: Fri Jul 18 2025 (07/18/2025, 13:48:45 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26

Description

A flaw was found in the Keycloak identity and access management system when Fine-Grained Admin Permissions(FGAPv2) are enabled. An administrative user with the manage-users role can escalate their privileges to realm-admin due to improper privilege enforcement. This vulnerability allows unauthorized elevation of access rights, compromising the intended separation of administrative duties and posing a security risk to the realm.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:36:42 UTC

Technical Analysis

CVE-2025-7784 identifies a privilege escalation vulnerability in the Red Hat build of Keycloak version 26, specifically when the Fine-Grained Admin Permissions version 2 (FGAPv2) feature is enabled. Keycloak is an open-source identity and access management system widely used for securing applications and services. FGAPv2 is designed to enforce strict administrative role boundaries, allowing granular control over administrative permissions. However, this vulnerability arises from improper privilege enforcement that allows an administrative user assigned the manage-users role to escalate their privileges to the realm-admin role. The realm-admin role has broad control over the entire realm, including configuration, user management, and security settings. This escalation breaks the principle of least privilege and can lead to unauthorized access to sensitive data and administrative functions. The vulnerability requires the attacker to have authenticated access with the manage-users role, but no additional user interaction is necessary. The CVSS v3.1 base score is 6.5, reflecting medium severity, with a vector indicating network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the flaw poses a significant risk to organizations relying on Keycloak for identity management, especially those with strict role separation policies. The absence of patch links suggests that remediation may require vendor updates or configuration changes once available.

Potential Impact

The primary impact of CVE-2025-7784 is unauthorized privilege escalation within Keycloak realms, undermining the security model that separates administrative duties. An attacker with manage-users privileges can gain realm-admin rights, allowing them to modify realm configurations, access or alter sensitive user data, and potentially disrupt security controls. This compromises confidentiality and integrity of identity and access management processes. Organizations relying on Keycloak for authentication and authorization may face increased risk of insider threats or compromised administrative accounts leading to broader system compromise. While availability is not directly affected, the breach of administrative controls can facilitate further attacks or data exfiltration. The vulnerability affects all organizations using Red Hat's Keycloak 26 with FGAPv2 enabled, including enterprises, government agencies, and cloud service providers. The risk is heightened in environments where administrative roles are strictly segmented to comply with regulatory or internal security policies.

Mitigation Recommendations

To mitigate CVE-2025-7784, organizations should first verify if they are using Red Hat's Keycloak 26 with FGAPv2 enabled. Immediate steps include restricting the assignment of the manage-users role to only highly trusted administrators and auditing existing role assignments for potential misuse. Monitoring and logging administrative actions can help detect suspicious privilege escalations. Since no patch links are currently available, organizations should follow Red Hat's advisories for forthcoming updates and apply patches promptly once released. In the interim, consider disabling FGAPv2 if feasible or implementing compensating controls such as multi-factor authentication for administrative accounts and enhanced session monitoring. Reviewing and tightening Keycloak's administrative role configurations and permissions can reduce the attack surface. Additionally, segregate Keycloak administrative access from other critical systems and enforce strict network segmentation to limit exposure. Regular security assessments and penetration testing focused on privilege escalation scenarios are recommended to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-07-18T06:05:57.305Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687a53a7a83201eaacf41efa

Added to database: 7/18/2025, 2:01:11 PM

Last enriched: 2/26/2026, 4:36:42 PM

Last updated: 3/24/2026, 7:49:43 PM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses