Impact
The vulnerability allows the Keycloak account REST API to remain partially enabled even when the `--features-disabled=account,account-api` flag is used. Five endpoints under the `/account/v1alpha1` path bypass the required gate and therefore remain fully functional for any user who has API access permissions. This improper access control can enable a malicious actor with limited permissions to access or modify account information, potentially leading to unauthorized data exposure or account manipulation. The weakness is identified as CWE-425 – Improper Privilege Management.
Affected Systems
The affected product is Red Hat Build of Keycloak. All versions that can be started with the feature‑disable flag and still expose the `/account/v1alpha1` endpoints are vulnerable. No specific version numbers are specified in the advisory.
Risk and Exploitability
The CVSS vector scores the issue as 5.4, indicating moderate severity. The EPSS score is not available and it is not listed in the CISA KEV catalog, suggesting no current evidence of active exploitation. The likely attack vector is remote, requiring network connectivity to the Keycloak server’s administration and API endpoints. Successful exploitation would allow a user with any API access rights to interact with the exposed endpoints, thereby bypassing intentional disabling of the account API service.
OpenCVE Enrichment