
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-11538 is a security vulnerability in Keycloak's server distribution that was discovered in 2025. The vulnerability affects Red Hat build of Keycloak 26.4.4 and related systems. The issue stems from the debug mode configuration where enabling the debug flag (--debug) results in insecure default binding of the Java Debug Wire Protocol (JDWP) port (Red Hat Advisory, Bugzilla Report).
The vulnerability occurs when debug mode is enabled using the --debug flag, which causes the Java Debug Wire Protocol (JDWP) port to bind to all network interfaces (0.0.0.0). This default configuration exposes the debug port to the entire local network segment, creating a significant security risk. The issue has been classified as having moderate severity by Red Hat (Red Hat Advisory).
When exploited, this vulnerability allows an attacker on the same network segment to attach a remote debugger to the exposed debug port. This access could lead to remote code execution within the Keycloak Java virtual machine, potentially compromising the entire system (Bugzilla Report).
Red Hat has addressed this vulnerability in Red Hat build of Keycloak 26.4.4. Users are advised to update to this version, which includes security fixes for this and other vulnerabilities. Before applying the update, it is recommended to back up existing installations, including all applications, configuration files, databases, and database settings (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."