Medium severity6.8OSV Advisory· Published Nov 13, 2025· Updated Apr 15, 2026
CVE-2025-11538
CVE-2025-11538
Description
A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-quarkus-distMaven | < 26.4.4 | 26.4.4 |
Affected products
1Patches
19e98f2bf961fVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- github.com/advisories/GHSA-j4vq-q93m-4683ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-11538ghsaADVISORY
- access.redhat.com/errata/RHSA-2025:21370nvdWEB
- access.redhat.com/errata/RHSA-2025:21371nvdWEB
- access.redhat.com/security/cve/CVE-2025-11538nvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/keycloak/keycloak/security/advisories/GHSA-j4vq-q93m-4683ghsaWEB
- github.com/keycloak/keycloak/commit/9e98f2bf961f68853cea6fbec58b512ed8be7ca9nvd
- github.com/keycloak/keycloak/pull/43574nvd
News mentions
0No linked articles in our index yet.