CVE-2024-10451
Java vulnerability analysis and mitigation

Overview

A security vulnerability (CVE-2024-10451) was discovered in Keycloak affecting versions up to 26.0.2. The vulnerability occurs when sensitive runtime values, such as passwords, are captured during the Keycloak build process and embedded as default values in bytecode, leading to potential information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is stored as default values, making it accessible during runtime (NVD).

Technical details

The vulnerability stems from the unconditional expansion of environment variables by PropertyMapper logic, which affects options with the 'kc' prefix, SPI runtime options, and Quarkus properties. This behavior results in sensitive data being embedded into the bytecode during the build process. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating potential remote exploitation with no authentication required (NVD).

Impact

The vulnerability could lead to unintended information disclosure of sensitive data in production builds. Sensitive runtime values, including passwords and other confidential information specified in environment variables, may be exposed during runtime due to their embedding in the bytecode (NVD).

Mitigation and workarounds

Red Hat has released security updates to address this vulnerability across multiple versions of Keycloak. Updates are available for Keycloak 24.0.9 and 26.0.6, which include fixes for this issue. Users are advised to upgrade to the patched versions (Red Hat Advisory, Red Hat Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66516CRITICAL10
  • JavaJava
  • tika
NoYesDec 04, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • org.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
CVE-2025-11222MEDIUM6.1
  • JavaJava
  • com.linecorp.centraldogma:centraldogma-server-auth-shiro
NoYesDec 04, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management