Remote Code Execution Risk in Keycloak Server Due to Insecure Debug Mode Configuration
CVE-2025-11538
6.8MEDIUM
What is CVE-2025-11538?
A flaw in Keycloak's server distribution allows enabling debug mode to insecurely bind the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This misconfiguration exposes the debug port to anyone on the same local network segment, providing potential attackers the ability to attach a remote debugger. Consequently, this could lead to unauthorized remote code execution within the Keycloak Java virtual machine, posing serious security risks for organizations utilizing the affected versions.
References
CVSS V3.1
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
This issue was discovered by Steven Hawkins (Red Hat).