Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Wed, 21 Jan 2026 21:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in the Keycloak Admin REST API. This vulnerability allows the exposure of backend schema and rules, potentially leading to targeted attacks or privilege escalation via improper access control. |
| Title | keycloak-server: Keycloak: Improper Access Control in Admin REST API leads to information disclosure | Keycloak-server: keycloak: improper access control in admin rest api leads to information disclosure |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
|
Wed, 10 Dec 2025 21:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | keycloak-server: Keycloak: Improper Access Control in Admin REST API leads to information disclosure | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-01-21T14:24:52.423Z
Reserved: 2025-12-05T05:59:08.365Z
Link: CVE-2025-14083
No data.
Status : Received
Published: 2026-01-21T13:16:02.777
Modified: 2026-01-21T13:16:02.777
Link: CVE-2025-14083
OpenCVE Enrichment
No data.