CVE-2025-10939
Java vulnerability analysis and mitigation

Overview

A security vulnerability was identified in Keycloak (CVE-2025-10939) related to unauthorized access to the admin console. The vulnerability was discovered and published to the CVE List on October 28, 2025. The issue affects the org.keycloak/keycloak-quarkus-server component when using proxy configurations, particularly with ha-proxy (Red Hat CVE, NVD).

Technical details

The vulnerability is classified as CWE-427 (Uncontrolled Search Path Element) with a CVSS v3.1 base score of 3.7 (Low). The technical issue involves the ability to bypass access restrictions to the /admin path when using a proxy server. Specifically, the vulnerability can be exploited by using relative/non-normalized paths to access the /admin application path relative to /realms, which is typically exposed (Red Hat Bugzilla).

Impact

The vulnerability allows potential unauthorized access to the admin console, which should normally be restricted from external access. While authentication is still required for the admin path, the vulnerability exposes a path that administrators believe to be inaccessible, potentially compromising the security posture of the system (Red Hat CVE).

Mitigation and workarounds

Currently, no official mitigation is available that meets Red Hat Product Security criteria for ease of use, deployment, and stability. The issue is more prominent in ha-proxy configurations, while other proxies like mod-proxy correctly manage non-normalized URLs by normalizing the path. It has been suggested that Keycloak should return an error by default for non-normalized URLs (Red Hat CVE).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62258HIGH7
  • JavaJava
  • cpe:2.3:a:liferay:liferay_portal
NoYesOct 27, 2025
CVE-2025-62259MEDIUM6.9
  • JavaJava
  • com.liferay.portal:release.portal.bom
NoYesOct 27, 2025
CVE-2025-12390MEDIUM6
  • JavaJava
  • org.keycloak:keycloak-services
NoNoOct 28, 2025
CVE-2025-64132MEDIUM5.4
  • JavaJava
  • io.jenkins.plugins:mcp-server
NoYesOct 29, 2025
CVE-2025-10939LOW3.7
  • JavaJava
  • org.keycloak:keycloak-quarkus-server
NoNoOct 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management