Remote Code Execution Risk in Keycloak Server Due to Insecure Debug Mode Configuration
CVE-2025-11538
Key Information:
- Vendor
Keycloak
- Vendor
- CVE Published:
- 13 November 2025
What is CVE-2025-11538?
A flaw in Keycloak's server distribution allows enabling debug mode to insecurely bind the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This misconfiguration exposes the debug port to anyone on the same local network segment, providing potential attackers the ability to attach a remote debugger. Consequently, this could lead to unauthorized remote code execution within the Keycloak Java virtual machine, posing serious security risks for organizations utilizing the affected versions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
keycloak 0 < 26.4.4
Red Hat build of Keycloak 26.4 26.4.4-1
Red Hat build of Keycloak 26.4 26.4-3
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
