CVE-2025-14778
Description
A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only verifies the caller's ownership against the first resource in the policy's list. This allows a user (Owner A) who owns one resource (RA) to update a shared policy and modify authorization rules for other resources (e.g., RB) in that same policy, even if those other resources are owned by a different user (Owner B). This constitutes a horizontal privilege escalation.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.keycloak:keycloak-servicesMaven | < 26.2.13 | 26.2.13 |
org.keycloak:keycloak-servicesMaven | >= 26.5.0, < 26.5.3 | 26.5.3 |
org.keycloak:keycloak-servicesMaven | >= 26.3.0, < 26.4.9 | 26.4.9 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- github.com/advisories/GHSA-fm6w-rrp3-2x4wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-14778ghsaADVISORY
- access.redhat.com/errata/RHSA-2026:2363nvdWEB
- access.redhat.com/errata/RHSA-2026:2364nvdWEB
- access.redhat.com/errata/RHSA-2026:2365nvdWEB
- access.redhat.com/errata/RHSA-2026:2366nvdWEB
- access.redhat.com/security/cve/CVE-2025-14778nvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/keycloak/keycloak/issues/46147ghsaWEB
- github.com/keycloak/keycloak/pull/46154ghsaWEB
News mentions
0No linked articles in our index yet.