Keycloak Admin Path Traversal Vulnerability (CVE-2025-10939)

low Nessus Plugin ID 272093

Synopsis

The remote host is affected by a path traversal vulnerability.

Description

The version of Keycloak installed on the remote host is affected by a path traversal vulnerability. A flaw was found in Keycloak where the /admin path can be accessed using relative/non-normalized paths (e.g., /realms/../admin/), bypassing proxy restrictions recommended in the Keycloak guides. This allows an attacker to access the admin console path that was intended to be blocked at the proxy level. While the admin path still requires authentication, this vulnerability exposes a path that administrators believe is not accessible from external networks.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Refer to the vendor advisory for patch or mitigation information.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=2398025

Plugin Details

Severity: Low

ID: 272093

File Name: keycloak_CVE-2025-10939.nasl

Version: 1.1

Type: local

Agent: unix

Family: Misc.

Published: 10/31/2025

Updated: 10/31/2025

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2025-10939

CVSS v3

Risk Factor: Low

Base Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:keycloak:keycloak

Required KB Items: installed_sw/Keycloak

Patch Publication Date: 10/28/2025

Vulnerability Publication Date: 10/28/2025

Reference Information

CVE: CVE-2025-10939

IAVB: 2025-B-0180