CVE-2025-11538

Source
https://cve.org/CVERecord?id=CVE-2025-11538
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-11538.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-11538
Aliases
Downstream
Related
Published
2025-11-13T17:15:44.820Z
Modified
2026-02-04T03:13:03.282548Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine.

References

Affected packages

Git / github.com/keycloak/keycloak

Affected ranges

Type
GIT
Repo
https://github.com/keycloak/keycloak
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*
1.0-alpha-1
1.0-alpha-1-12062013
1.0-alpha-2
1.0-alpha-3
1.0-beta-1
1.0-beta-2
1.0-beta-4
1.0-final
1.0-rc-1
1.0.0.Final
1.1.0.Beta2
1.3.0.Final
2.*
2.4.0.Test

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-11538.json"