No analysis available yet.
Vendor Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7m9g-pmxf-m9m8 | Keycloak allows Binding to an Unrestricted IP Address |
Github GHSA |
GHSA-j4vq-q93m-4683 | Keycloak has debug default bind address |
Fri, 19 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 14 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 13 Nov 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| References |
|
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine. | |
| Title | Keycloak-server: debug default bind address | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-1327 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-19T21:26:09.332Z
Reserved: 2025-10-09T01:57:42.633Z
Link: CVE-2025-11538
Updated: 2025-11-13T18:01:09.449Z
Status : Awaiting Analysis
Published: 2025-11-13T17:15:44.820
Modified: 2025-12-19T21:15:53.473
Link: CVE-2025-11538
OpenCVE Enrichment
No data.
Github GHSA