CVE-2025-14777
Keycloak: keycloak idor in realm client creating/deleting
A flaw was found in Keycloak. An IDOR (Broken Access Control) vulnerability exists in the admin API endpoints for authorization resource management, specifically in ResourceSetService and PermissionTicketService. The system checks authorization against the resourceServer (client) ID provided in the API request, but the backend database lookup and modification operations (findById, delete) only use the resourceId. This mismatch allows an authenticated attacker with fine-grained admin permissions for one client (e.g., Client A) to delete or update resources belonging to another client (Client B) within the same realm by supplying a valid resource ID.
| CWE | CWE-289 |
| Vendor | red hat |
| Product | red hat build of keycloak 26.4 |
| Published | Dec 16, 2025 |
| Last Updated | Apr 2, 2026 |
Get instant alerts for red hat red hat build of keycloak 26.4
Be the first to know when new medium vulnerabilities affecting red hat red hat build of keycloak 26.4 are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L