A flaw was found in Keycloak Admin REST (Representational State Transfer) API. This vulnerability allows information disclosure of sensitive role metadata via insufficient authorization checks on the /admin/realms/{realm}/roles endpoint.
Metrics
Affected Vendors & Products
References
History
Wed, 10 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 10 Dec 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak Admin REST (Representational State Transfer) API. This vulnerability allows information disclosure of sensitive role metadata via insufficient authorization checks on the /admin/realms/{realm}/roles endpoint. | |
| Title | Keycloak-services: keycloak admin rest api: improper access control leads to sensitive role metadata information disclosure | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-12-10T09:04:51.343Z
Updated: 2025-12-10T14:39:57.925Z
Reserved: 2025-12-05T05:32:13.023Z
Link: CVE-2025-14082
Updated: 2025-12-10T14:39:54.545Z
Status : Received
Published: 2025-12-10T09:15:46.857
Modified: 2025-12-10T09:15:46.857
Link: CVE-2025-14082