{
  "threat_severity" : "Low",
  "public_date" : "2025-12-05T00:00:00Z",
  "bugzilla" : {
    "description" : "keycloak-services: Keycloak Admin REST API: Improper Access Control leads to sensitive role metadata information disclosure",
    "id" : "2419078",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2419078"
  },
  "cvss3" : {
    "cvss3_base_score" : "2.7",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-284",
  "details" : [ "A flaw was found in Keycloak Admin REST (Representational State Transfer) API. This vulnerability allows information disclosure of sensitive role metadata via insufficient authorization checks on the /admin/realms/{realm}/roles endpoint.", "A flaw was found in Keycloak Admin REST (Representational State Transfer) API. This vulnerability allows information disclosure of sensitive role metadata via insufficient authorization checks on the /admin/realms/{realm}/roles endpoint." ],
  "statement" : "The highest threat is to confidentiality. This flaw allows a remote authenticated attacker with high-privileged but restricted access to the Keycloak Admin REST API to retrieve sensitive role metadata, which can be used to map privilege structures and plan targeted privilege-escalation attempts.",
  "acknowledgement" : "Red Hat would like to thank Muhammad Usman (HackerSSG) (securetackles) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6478",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.4.11-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6478",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9:26.4-14"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6478",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.4-14"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4.11",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6477",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "keycloak-server"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-14082\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-14082" ],
  "name" : "CVE-2025-14082",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}