A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c6cm-5gc7-c3f4 Keycloak allows access to admin path through flaw
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Tue, 28 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Oct 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Tue, 28 Oct 2025 03:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keycloak. The Keycloak guides recommend to not expose /admin path to the outside in case the installation is using a proxy. The issue occurs at least via ha-proxy, as it can be tricked to using relative/non-normalized paths to access the /admin application path relative to /realms which is expected to be exposed.
Title Org.keycloak/keycloak-quarkus-server: unable to restrict access to the admin console
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-427
CPEs cpe:/a:redhat:build_keycloak:
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-10-28T20:02:03.310Z

Reserved: 2025-09-25T03:17:59.929Z

Link: CVE-2025-10939

cve-icon Vulnrichment

Updated: 2025-10-28T20:01:56.936Z

cve-icon NVD

Status : Received

Published: 2025-10-28T04:16:15.217

Modified: 2025-10-28T04:16:15.217

Link: CVE-2025-10939

cve-icon Redhat

Severity : Low

Publid Date: 2025-10-27T00:00:00Z

Links: CVE-2025-10939 - Bugzilla

cve-icon OpenCVE Enrichment

No data.