Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c6cm-5gc7-c3f4 | Keycloak allows access to admin path through flaw |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Thu, 13 Nov 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| References |
|
Tue, 28 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Oct 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 28 Oct 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed. | |
| Title | Org.keycloak/keycloak-quarkus-server: unable to restrict access to the admin console | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-427 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-13T22:33:58.213Z
Reserved: 2025-09-25T03:17:59.929Z
Link: CVE-2025-10939
Updated: 2025-10-28T20:01:56.936Z
Status : Awaiting Analysis
Published: 2025-10-28T04:16:15.217
Modified: 2025-11-13T23:15:48.523
Link: CVE-2025-10939
OpenCVE Enrichment
No data.
Github GHSA