2.7

CVE-2025-10043

A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (\). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorRed Hat
Product Red Hat build of Keycloak 26.2
Default Statusaffected
Version < *
Version 26.2.9-1
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 26.2
Default Statusaffected
Version < *
Version 26.2-9
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 26.2
Default Statusaffected
Version < *
Version 26.2-9
Status unaffected
VendorRed Hat
Product Red Hat build of Keycloak 26.2.9
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.089
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 2.7 1.2 1.4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CWE-73 External Control of File Name or Path

The product allows user input to control or influence paths or file names that are used in filesystem operations.