Remote Code Execution Risk in Keycloak Server Due to Insecure Debug Mode Configuration
CVE-2025-11538

6.8MEDIUM

Key Information:

Vendor

Red Hat

Vendor
CVE Published:
13 November 2025

What is CVE-2025-11538?

A flaw in Keycloak's server distribution allows enabling debug mode to insecurely bind the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This misconfiguration exposes the debug port to anyone on the same local network segment, providing potential attackers the ability to attach a remote debugger. Consequently, this could lead to unauthorized remote code execution within the Keycloak Java virtual machine, posing serious security risks for organizations utilizing the affected versions.

References

CVSS V3.1

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue was discovered by Steven Hawkins (Red Hat).
.
CVE-2025-11538 : Remote Code Execution Risk in Keycloak Server Due to Insecure Debug Mode Configuration