A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7m9g-pmxf-m9m8 Keycloak allows Binding to an Unrestricted IP Address
Github GHSA Github GHSA GHSA-j4vq-q93m-4683 Keycloak has debug default bind address
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Sat, 20 Dec 2025 05:30:00 +0900


Fri, 14 Nov 2025 09:15:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 14 Nov 2025 07:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:build_keycloak: cpe:/a:redhat:build_keycloak:26.4::el9
References

Fri, 14 Nov 2025 03:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Nov 2025 02:00:00 +0900

Type Values Removed Values Added
Description A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine.
Title Keycloak-server: debug default bind address
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-1327
CPEs cpe:/a:redhat:build_keycloak:
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-12-19T21:26:09.332Z

Reserved: 2025-10-09T01:57:42.633Z

Link: CVE-2025-11538

cve-icon Vulnrichment

Updated: 2025-11-13T18:01:09.449Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-13T17:15:44.820

Modified: 2025-12-19T21:15:53.473

Link: CVE-2025-11538

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-11-13T15:00:00Z

Links: CVE-2025-11538 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses