A flaw was found in the Keycloak Admin REST API. This vulnerability allows the exposure of backend schema and rules, potentially leading to targeted attacks or privilege escalation via improper access control.
Metrics
Affected Vendors & Products
References
History
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| References |
|
Wed, 21 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in the Keycloak Admin REST API. This vulnerability allows the exposure of backend schema and rules, potentially leading to targeted attacks or privilege escalation via improper access control. |
| Title | keycloak-server: Keycloak: Improper Access Control in Admin REST API leads to information disclosure | Keycloak-server: keycloak: improper access control in admin rest api leads to information disclosure |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
|
Wed, 10 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | keycloak-server: Keycloak: Improper Access Control in Admin REST API leads to information disclosure | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2026-01-21T12:04:12.641Z
Updated: 2026-04-02T16:47:15.987Z
Reserved: 2025-12-05T05:59:08.365Z
Link: CVE-2025-14083
Updated: 2026-01-21T14:22:25.363Z
Status : Deferred
Published: 2026-01-21T13:16:02.777
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14083