A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed.
History

Tue, 28 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Oct 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Tue, 28 Oct 2025 03:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed.
Title Org.keycloak/keycloak-quarkus-server: unable to restrict access to the admin console
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-427
CPEs cpe:/a:redhat:build_keycloak:
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-10-28T03:08:30.103Z

Updated: 2025-10-28T20:02:03.310Z

Reserved: 2025-09-25T03:17:59.929Z

Link: CVE-2025-10939

cve-icon Vulnrichment

Updated: 2025-10-28T20:01:56.936Z

cve-icon NVD

Status : Received

Published: 2025-10-28T04:16:15.217

Modified: 2025-10-28T04:16:15.217

Link: CVE-2025-10939

cve-icon Redhat

Severity : Low

Publid Date: 2025-10-27T00:00:00Z

Links: CVE-2025-10939 - Bugzilla