CVE-2024-9666
Java vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2024-9666) was discovered in the Keycloak Server affecting versions 26 and earlier. The vulnerability was disclosed on November 25, 2024, impacting the server's proxy header handling mechanism (NVD, Red Hat Bugzilla).

Technical details

The vulnerability stems from improper handling of proxy headers in Keycloak Server. When configured to accept incoming proxy headers, the server may accept non-IP values, including obfuscated identifiers, without proper validation. For successful exploitation in Keycloak version 26, specific conditions must be met: the realm must have SslRequired=EXTERNAL (default setting), HTTP must be enabled, the instance must not use a full hostname URL, access must come from behind a proxy, and trusted proxies must either not be set or incorrectly trust the originating client request (Red Hat Bugzilla). The vulnerability has been assigned a CVSS v3.1 base score of 4.7 (Medium) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service (DoS) in the Keycloak Server. This can affect the availability of authentication and single sign-on capabilities for web and mobile applications relying on the affected Keycloak instance (NVD).

Mitigation and workarounds

Red Hat has released security updates to address this vulnerability across multiple versions of Keycloak. Updates are available in Keycloak versions 24.0.9 and 26.0.6 through various security advisories (RHSA-2024:10175, RHSA-2024:10176, RHSA-2024:10177, and RHSA-2024:10178). The vulnerability has been resolved through a fix implemented in the Keycloak codebase (Red Hat Errata).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-66474HIGH8.7
  • JavaJava
  • org.xwiki.rendering:xwiki-rendering-xml
NoYesDec 10, 2025
CVE-2025-66473HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-rest-server
NoYesDec 10, 2025
CVE-2025-67505HIGH8.4
  • JavaJava
  • com.okta.sdk:okta-sdk-root
NoYesDec 10, 2025
CVE-2025-14518MEDIUM5.3
  • JavaJava
  • tech.powerjob:powerjob-common
NoNoDec 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management