A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7m9g-pmxf-m9m8 Keycloak allows Binding to an Unrestricted IP Address
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Fri, 14 Nov 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 13 Nov 2025 22:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:build_keycloak: cpe:/a:redhat:build_keycloak:26.4::el9
References

Thu, 13 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine.
Title Keycloak-server: debug default bind address
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-1327
CPEs cpe:/a:redhat:build_keycloak:
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-13T22:32:47.598Z

Reserved: 2025-10-09T01:57:42.633Z

Link: CVE-2025-11538

cve-icon Vulnrichment

Updated: 2025-11-13T18:01:09.449Z

cve-icon NVD

Status : Received

Published: 2025-11-13T17:15:44.820

Modified: 2025-11-13T23:15:49.380

Link: CVE-2025-11538

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-11-13T15:00:00Z

Links: CVE-2025-11538 - Bugzilla

cve-icon OpenCVE Enrichment

No data.