Remote Code Execution Risk in Keycloak Server Due to Insecure Debug Mode Configuration
CVE-2025-11538

6.8MEDIUM

What is CVE-2025-11538?

A flaw in Keycloak's server distribution allows enabling debug mode to insecurely bind the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This misconfiguration exposes the debug port to anyone on the same local network segment, providing potential attackers the ability to attach a remote debugger. Consequently, this could lead to unauthorized remote code execution within the Keycloak Java virtual machine, posing serious security risks for organizations utilizing the affected versions.

Affected Version(s)

Red Hat build of Keycloak 26.4 26.4.4-1

Red Hat build of Keycloak 26.4 26.4-3

Red Hat build of Keycloak 26.4 26.4-3

References

CVSS V3.1

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue was discovered by Steven Hawkins (Red Hat).
.