Broken Access Control Vulnerability in Keycloak Admin API
CVE-2025-14777

6MEDIUM

Key Information:

Vendor

Red Hat

Vendor
CVE Published:
16 December 2025

What is CVE-2025-14777?

A vulnerability has been identified in Keycloak wherein the admin API endpoints for managing authorization resources are susceptible to insecure direct object reference. Specifically, the flaw resides in the ResourceSetService and PermissionTicketService components. The system performs authorization checks based on the client ID specified in the API request but relies solely on the resource ID for database operations. This inconsistency can be exploited by an authenticated attacker with elevated permissions for one client to manipulate or delete resources that belong to another client within the same realm, by providing a valid resource ID. This poses significant risks to data integrity and security.

References

CVSS V3.1

Score:
6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Joshua Rogers for reporting this issue.
.
CVE-2025-14777 : Broken Access Control Vulnerability in Keycloak Admin API