{
  "threat_severity" : "Moderate",
  "public_date" : "2026-02-09T18:24:00Z",
  "bugzilla" : {
    "description" : "keycloak: Incorrect ownership checks in /uma-policy/",
    "id" : "2422600",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2422600"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-266",
  "details" : [ "A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only verifies the caller's ownership against the first resource in the policy's list. This allows a user (Owner A) who owns one resource (RA) to update a shared policy and modify authorization rules for other resources (e.g., RB) in that same policy, even if those other resources are owned by a different user (Owner B). This constitutes a horizontal privilege escalation.", "A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only verifies the caller's ownership against the first resource in the policy's list. This allows a user (Owner A) who owns one resource (RA) to update a shared policy and modify authorization rules for other resources (e.g., RB) in that same policy, even if those other resources are owned by a different user (Owner B). This constitutes a horizontal privilege escalation." ],
  "acknowledgement" : "Red Hat would like to thank Joshua Rogers for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2364",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.2.13-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2364",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9:26.2-15"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2364",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.2-15"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2.13",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2363",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9-operator"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2366",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.4.9-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2366",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9:26.4-11"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2366",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.4-10"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4.9",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2365",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9-operator"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-14778\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-14778" ],
  "name" : "CVE-2025-14778",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}