Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27027 | A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (\). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492. |
Thu, 09 Oct 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Keycloak: incomplete fix of cve-2024-10492 | keycloak: Incomplete fix of CVE-2024-10492 |
| Metrics |
ssvc
|
Thu, 09 Oct 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 09 Oct 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (\). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492. | Considered by the maintainers a bug scenario experienced rather than a vulnerability. |
| CPEs | ||
| Vendors & Products |
Redhat
Redhat build Keycloak |
Mon, 22 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 22 Sep 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:build_keycloak:26.2::el9 | |
| References |
|
Sat, 06 Sep 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 05 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (\). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492. | |
| Title | Keycloak: incomplete fix of cve-2024-10492 | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-73 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: REJECTED
Assigner: redhat
Published:
Updated: 2025-10-09T01:45:58.716Z
Reserved: 2025-09-05T18:12:23.630Z
Link: CVE-2025-10043
Updated:
Status : Rejected
Published: 2025-09-05T20:15:34.220
Modified: 2025-10-09T02:15:40.607
Link: CVE-2025-10043
OpenCVE Enrichment
No data.
EUVD