Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c6cm-5gc7-c3f4 | Keycloak allows access to admin path through flaw |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Tue, 28 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Oct 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 28 Oct 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed. | |
| Title | Org.keycloak/keycloak-quarkus-server: unable to restrict access to the admin console | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-427 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-28T20:02:03.310Z
Reserved: 2025-09-25T03:17:59.929Z
Link: CVE-2025-10939
Updated: 2025-10-28T20:01:56.936Z
Status : Received
Published: 2025-10-28T04:16:15.217
Modified: 2025-10-28T04:16:15.217
Link: CVE-2025-10939
OpenCVE Enrichment
No data.
Github GHSA