CVE Vulnerabilities

CVE-2025-14778

Incorrect Privilege Assignment

Published: Feb 09, 2026 | Modified: Feb 10, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.4 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only verifies the callers ownership against the first resource in the policys list. This allows a user (Owner A) who owns one resource (RA) to update a shared policy and modify authorization rules for other resources (e.g., RB) in that same policy, even if those other resources are owned by a different user (Owner B). This constitutes a horizontal privilege escalation.

Weakness

A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-operator-bundle:26.2.13-1*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9:26.2-15*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9-operator:26.2-15*
Red Hat build of Keycloak 26.2.13RedHatrhbk/keycloak-rhel9-operator*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-operator-bundle:26.4.9-1*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9:26.4-11*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9-operator:26.4-10*
Red Hat build of Keycloak 26.4.9RedHatrhbk/keycloak-rhel9-operator*

Potential Mitigations

References