Keycloak < 26.4.4 Debug Mode JDWP Port Exposure (CVE-2025-11538)

medium Nessus Plugin ID 297528

Synopsis

The remote host is missing one or more security updates.

Description

The version of Keycloak installed on the remote host is prior to 26.4.4. It is, therefore, affected by a Port Exposure vulnerability:

- A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine. (CVE-2025-11538)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

See vendor advisory

See Also

https://github.com/advisories/GHSA-j4vq-q93m-4683

Plugin Details

Severity: Medium

ID: 297528

File Name: keycloak_26_4_4.nasl

Version: 1.1

Type: local

Agent: unix

Family: Misc.

Published: 2/2/2026

Updated: 2/2/2026

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Vector: CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2025-11538

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/a:keycloak:keycloak

Required KB Items: installed_sw/Keycloak

Patch Publication Date: 11/7/2025

Vulnerability Publication Date: 12/1/2025

Reference Information

CVE: CVE-2025-11538

IAVB: 2026-B-0023