CVE-2025-10939
Org.keycloak/keycloak-quarkus-server: unable to restrict access to the admin console
CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed.
| CWE | CWE-427 |
| Vendor | keycloak |
| Product | keycloak |
| Published | Oct 28, 2025 |
| Last Updated | Dec 19, 2025 |
Stay Ahead of the Next One
Get instant alerts for keycloak keycloak
Be the first to know when new low vulnerabilities affecting keycloak keycloak are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Affected Versions
Keycloak / keycloak
0 < 26.4.4
Red Hat / Red Hat build of Keycloak 26.4
All versions affected Red Hat / Red Hat build of Keycloak 26.4
All versions affected Red Hat / Red Hat build of Keycloak 26.4
All versions affected Red Hat / Red Hat build of Keycloak 26.4.4
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21370 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21371 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-10939 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2398025 github.com: https://github.com/keycloak/keycloak/issues/43763 github.com: https://github.com/keycloak/keycloak/pull/43765
Credits
Red Hat would like to thank Sebastian Reigber (AEB) for reporting this issue.